General User Reports

16 Reports
About General User Reports

General User Reports provide comprehensive insights into basic user account information and configurations across your Active Directory domain. These reports help administrators manage user accounts, audit organizational structure, and maintain accurate user information.

Fast Reports

Generate complete user inventories in seconds

Flexible Filtering

Apply custom LDAP filters for targeted results

Easy Export

Export to Excel, CSV, or PDF formats

What Are Active Directory Users?

Active Directory Users are individual accounts that represent people or entities with access to resources within an Active Directory domain. They serve as security principals and are the foundation of network authentication and authorization.

Key Characteristics:
  • Unique security identifier (SID)
  • User Principal Name (UPN)
  • Group memberships and permissions
  • Contact and organizational info
Used For:
  • Network authentication
  • Resource access control
  • Email and communication
  • Audit and compliance tracking

Example: General User Reports in AD Reports

AD Reports General User Reports

Available Reports

All Users Report

Retrieves a complete list of all user accounts in the selected domain, providing a comprehensive inventory of your entire user base without any filters applied.

Use Cases
  • Create master inventory of all user accounts
  • Audit total user count for licensing
  • Export complete user directory
  • Baseline report before applying filters
Key Information
  • Display names and account names
  • User Principal Names (UPN)
  • Organizational Unit locations
  • Email addresses
  • Account creation dates
Pro Tip: Use this as your starting point, then apply custom LDAP filters to narrow down results for specific requirements like department, location, or account status.
Managers Report

Identifies all users who have direct reports, providing a complete list of managers within your organization's hierarchy. Essential for organizational structure analysis and management chain visibility.

Use Cases
  • Map organizational management structure
  • Identify leadership roles
  • Audit manager assignments
  • Support HR organizational charts
Key Information
  • Manager names and accounts
  • Number of direct reports
  • Department and title
  • Contact information
  • Organizational hierarchy level
Pro Tip: Combine with the "With Managers" report to create a complete organizational hierarchy map showing all manager-employee relationships.
With Managers Report

Lists all users who have an assigned manager in their Active Directory profile, showing the reporting relationships within your organization. Useful for verifying organizational structure completeness.

Use Cases
  • Verify manager assignments
  • Audit reporting relationships
  • Support HR compliance
  • Validate org chart accuracy
Key Information
  • Employee names and accounts
  • Assigned manager names
  • Manager contact details
  • Department associations
  • Job titles
Pro Tip: Export this report periodically to track organizational changes and ensure manager assignments stay current as employees move between departments.
Without Managers Report

Identifies users who do not have an assigned manager in their AD profile. Critical for discovering incomplete organizational data and ensuring all employees have proper reporting relationships defined.

Use Cases
  • Identify missing manager assignments
  • Data quality auditing
  • HR compliance verification
  • Onboarding process validation
Key Information
  • User accounts without managers
  • Department assignments
  • Job titles
  • Account creation dates
  • Last logon times
Action Required: Review this list regularly to ensure all active employees have proper manager assignments for accurate organizational hierarchy and approval workflows.
With Dial-In Access Report

Lists all users with remote dial-in access permissions enabled, allowing them to connect to the corporate network via Remote Access Service (RAS). Important for security auditing and VPN access management.

Use Cases
  • Audit remote access permissions
  • Security compliance reviews
  • VPN user inventory
  • Remote worker management
Key Information
  • Users with dial-in enabled
  • Account status
  • Department and location
  • Last logon information
  • Remote access policy assignments
Security Note: Review this report quarterly to ensure only authorized users have remote access capabilities and remove permissions from terminated or transferred employees immediately.
Without Dial-In Access Report

Shows all users who do not have dial-in access permissions, helping identify which users cannot connect remotely to the corporate network. Useful for managing access requests and planning remote work capabilities.

Use Cases
  • Identify users needing remote access
  • Plan VPN deployment
  • Remote work readiness assessment
  • Access request processing
Key Information
  • Users without remote access
  • Job roles and departments
  • Work location (office/remote)
  • Account status
  • Contact information
Pro Tip: Use this report to proactively identify employees who may need remote access but haven't requested it, especially useful during remote work transitions or disaster recovery planning.
With Logon Script Report

Lists users who have a logon script configured in their AD profile. Logon scripts automatically execute when users log in, mapping drives, setting configurations, or running automated tasks.

Use Cases
  • Audit logon script assignments
  • Migration planning (scripts to GPO)
  • Troubleshoot login issues
  • Standardize configurations
Key Information
  • Assigned script names and paths
  • User accounts with scripts
  • Script locations on network
  • Department groupings
  • Last modified dates
Pro Tip: Logon scripts are legacy technology. Use this report to identify users still using scripts and plan migration to Group Policy Preferences or modern management tools.
Without Logon Script Report

Shows users who do not have any logon script assigned to their account. Useful for identifying users who may need scripts applied or confirming successful migration away from legacy logon scripts.

Use Cases
  • Verify script migration completion
  • Identify users needing scripts
  • Confirm modern management adoption
  • Troubleshoot missing configurations
Key Information
  • Users without logon scripts
  • Alternative configuration methods
  • Department and OU placement
  • Group Policy assignments
  • Account creation dates
Best Practice: Modern environments should have few or no logon scripts. Users in this report are likely using more efficient Group Policy or modern device management solutions.
With User's Profile

Lists users who have a specified roaming profile path configured in their AD account. Roaming profiles allow users to maintain their desktop settings and files across different computers.

Use Cases
  • Audit roaming profile configurations
  • Profile storage capacity planning
  • Identify profile path inconsistencies
  • Migration planning for modern solutions
Key Information
  • Profile path locations
  • Server hosting profiles
  • Profile versions (v2, v6)
  • User accounts with profiles
  • Last logon with profile
Pro Tip: Roaming profiles can cause slow logon times and consume significant storage. Consider migrating to folder redirection or modern profile solutions like FSLogix or OneDrive.
Without User's Profile

Shows users who do not have a roaming profile path configured, meaning they use local profiles on each computer they log into. Common in modern environments that have moved away from roaming profiles.

Use Cases
  • Identify users with local profiles
  • Verify modern profile strategy adoption
  • Plan profile assignments
  • Troubleshoot profile issues
Key Information
  • Users without roaming profiles
  • Workstation assignments
  • Department and location
  • Alternative solutions in use
  • User work patterns
Modern Approach: Most organizations now use cloud-based profile solutions or folder redirection instead of roaming profiles for better performance and user experience.
With Hidden Mailboxes

Lists users whose mailboxes are hidden from the Global Address List (GAL). These accounts exist but won't appear when other users search for them in Outlook or other email clients.

Use Cases
  • Identify service accounts with mailboxes
  • Audit privacy settings
  • Find shared/resource mailboxes
  • Security and compliance reviews
Key Information
  • Hidden mailbox accounts
  • Mailbox types (user, shared, room)
  • Hiding reasons
  • Email addresses
  • Mailbox sizes
Security Note: Review hidden mailboxes regularly to ensure they're intentional. Unauthorized hidden mailboxes could indicate security risks or data exfiltration attempts.
With Share (Home Directory)

Lists users who have a home directory configured (local or network), providing centralized storage for their personal files. Home directories enable easy backup, recovery, and access from any network computer.

Use Cases
  • Audit home directory assignments
  • Storage capacity planning
  • Backup strategy verification
  • Migration planning
Key Information
  • Home directory paths
  • Drive letter mappings
  • Server locations
  • Quota assignments
  • Usage statistics
Pro Tip: Regularly audit home directories to ensure consistent naming conventions, proper permissions, and adequate storage allocation across your user base.
With Network Share

Shows users whose home directory is configured as a network location (UNC path), allowing access to their files from any computer on the network and enabling centralized backup and management.

Use Cases
  • Identify users with network storage
  • Server load distribution analysis
  • Network storage auditing
  • DFS migration planning
Key Information
  • Network UNC paths
  • File server names
  • Drive letter assignments
  • Access permissions
  • Quota settings
Best Practice: Network home directories provide better data protection than local storage. Consider implementing for all users who don't already have cloud storage solutions.
With Local Share

Lists users configured with local home directories on their workstation (e.g., C:\Users\username). Less common in enterprise environments due to backup and portability challenges.

Use Cases
  • Identify users at risk for data loss
  • Plan migration to network storage
  • Backup strategy gaps
  • Compliance risk assessment
Key Information
  • Local directory paths
  • Workstation assignments
  • User accounts
  • Department and location
  • Risk assessment data
Risk Warning: Users with local home directories are vulnerable to data loss from hardware failure. Prioritize migrating these users to network or cloud storage solutions.
Without Share (Home Directory)

Shows users who have no home directory configured in AD. These users may be storing files locally without centralized management, backup, or IT oversight.

Use Cases
  • Identify users needing home directories
  • New user onboarding verification
  • Data protection gap analysis
  • Storage deployment planning
Key Information
  • Users without home directories
  • Account creation dates
  • Department assignments
  • Alternative storage methods
  • Compliance status
Action Item: Review this list to ensure all active users have appropriate storage solutions. Consider implementing folder redirection or OneDrive for modern file management.
With Home Directory Required

Lists users who have the "Home Directory Required" flag set in their account properties, typically indicating organizational policy that mandates centralized storage for these users.

Use Cases
  • Compliance verification
  • Policy enforcement auditing
  • Storage requirement tracking
  • User provisioning validation
Key Information
  • Users requiring home directories
  • Current directory assignments
  • Compliance status
  • Department policies
  • Exception handling
Compliance: Users in this report must have home directories configured. Cross-reference with "Without Share" report to identify any compliance gaps requiring immediate attention.