{"id":523029,"date":"2025-09-09T16:29:18","date_gmt":"2025-09-09T16:29:18","guid":{"rendered":"https:\/\/www.ninjaone.com\/?post_type=script_hub&#038;p=523029"},"modified":"2025-09-09T16:30:44","modified_gmt":"2025-09-09T16:30:44","slug":"detecter-les-comptes-verrouilles-sur-windows-2","status":"publish","type":"script_hub","link":"https:\/\/www.ninjaone.com\/fr\/script-hub\/detecter-les-comptes-verrouilles-sur-windows-2\/","title":{"rendered":"Guide de script PowerShell : D\u00e9tecter les comptes verrouill\u00e9s sur Windows"},"content":{"rendered":"<h2>Points \u00e0 retenir<\/h2>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>PowerShell pour plus d&rsquo;efficacit\u00e9<\/strong>: Utiliser PowerShell pour identifier rapidement les comptes verrouill\u00e9s dans les environnements Windows.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><strong>Exclut Azure AD<\/strong>: Le script ne couvre pas les comptes Azure AD, se concentrant uniquement sur les comptes locaux et les comptes de contr\u00f4leur de domaine.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><strong>D\u00e9tection sp\u00e9cifique \u00e0 l&rsquo;environnement<\/strong>: Adapte son approche suivant s&rsquo;il est ex\u00e9cut\u00e9 sur un contr\u00f4leur de domaine ou sur une station de travail.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><strong>R\u00e9sultats personnalisables<\/strong>: Il offre une grande flexibilit\u00e9 pour le format des r\u00e9sultats et permet l&rsquo;exportation dans en fichiers CSV et TXT.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"5\" data-aria-level=\"1\"><strong>Capacit\u00e9 de filtrage des utilisateurs<\/strong>: Il peut cibler des utilisateurs sp\u00e9cifiques si n\u00e9cessaire, ce qui am\u00e9liore sa pr\u00e9cision.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"6\" data-aria-level=\"1\"><strong>Automatis\u00e9 plut\u00f4t que manuel<\/strong>: Repr\u00e9sente une alternative efficace aux m\u00e9thodes de v\u00e9rification manuelle des comptes.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"7\" data-aria-level=\"1\"><strong>Indication de probl\u00e8mes plus vastes<\/strong>: Les comptes verrouill\u00e9s peuvent \u00eatre le signe de probl\u00e8mes de s\u00e9curit\u00e9 ou d&rsquo;exploitation plus vastes.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"8\" data-aria-level=\"1\"><strong>Accessible aux d\u00e9butants<\/strong>: Facile \u00e0 utiliser pour ceux qui ont des connaissances de base de PowerShell, mais personnalisable pour les utilisateurs avanc\u00e9s.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"9\" data-aria-level=\"1\">Un <strong>suivi r\u00e9gulier est recommand\u00e9<\/strong>: Il est pr\u00e9f\u00e9rable de l&rsquo;utiliser dans le cadre d&rsquo;une strat\u00e9gie de suivi r\u00e9gulier des comptes.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"10\" data-aria-level=\"1\"><strong>Am\u00e9lior\u00e9 avec NinjaOne<\/strong>: Les fonctionnalit\u00e9s du script compl\u00e8tent les outils de <a href=\"https:\/\/www.ninjaone.com\/fr\/\">gestion informatique complets<\/a> de NinjaOne.<\/li>\n<\/ul>\n<p>Le monde de la s\u00e9curit\u00e9 informatique \u00e9tant en constante \u00e9volution, la gestion des comptes d&rsquo;utilisateurs reste un \u00e9l\u00e9ment primordial pour permettre une protection des syst\u00e8mes et des donn\u00e9es. L&rsquo;un des aspects essentiels est la surveillance et le traitement des comptes verrouill\u00e9s, un probl\u00e8me courant dans les environnements informatiques vastes et dynamiques. Avec PowerShell, les administrateurs peuvent identifier efficacement les comptes verrouill\u00e9s, garantissant ainsi la continuit\u00e9 et la s\u00e9curit\u00e9 de l&rsquo;entreprise.<\/p>\n<h2>Contexte<\/h2>\n<p>Le script PowerShell fourni appara\u00eet comme un outil essentiel pour les professionnels de l&rsquo;informatique et les<a href=\"https:\/\/www.ninjaone.com\/fr\/quest-ce-quun-msp\/\"> fournisseurs de services g\u00e9r\u00e9s (MSP)<\/a>. Sa fonction principale est d&rsquo;identifier les comptes verrouill\u00e9s dans un environnement Windows, \u00e0 l&rsquo;exclusion des comptes <a href=\"https:\/\/www.ninjaone.com\/blog\/azure-ad-connect-what-it-is-and-how-to-configure-it\/\">Azure AD<\/a>. Cette capacit\u00e9 est cruciale pour maintenir l&rsquo;efficacit\u00e9 op\u00e9rationnelle et la s\u00e9curit\u00e9, car les comptes verrouill\u00e9s peuvent \u00eatre \u00e0 la fois le sympt\u00f4me d&rsquo;une erreur de l&rsquo;utilisateur et l&rsquo;indicateur potentiel d&rsquo;une <a href=\"https:\/\/www.ninjaone.com\/fr\/it-hub\/endpoint-security\/qu-est-ce-qu-une-fuite-de-donnees\/\">faille de s\u00e9curit\u00e9<\/a>.<\/p>\n<h2>Le script\u00a0:<\/h2>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"powershell\">&lt;#\r\n.SYNOPSIS\r\n    This script will see if any accounts on a local machine or on a domain controller are locked out. \r\n    You can optionally export this information into a custom field.\r\n\r\n    Does NOT check Azure AD Accounts.\r\n.DESCRIPTION\r\n    This script will see if any accounts on a local machine or on a domain controller are locked out. \r\n    You can optionally export this information into a custom field.\r\n\r\n    Does NOT check Azure AD Accounts.\r\n    \r\n.EXAMPLE\r\n    (No Parameters but ran on a DC)\r\n    SamAccountName LastLogonDate        PasswordExpired Enabled\r\n    -------------- -------------        --------------- -------\r\n    user           4\/20\/2023 1:09:23 PM           False    True\r\n\r\n.EXAMPLE\r\n    (No Parameters but ran on a Workstation)\r\n    Name  Domain LocalAccount Disabled\r\n    ----  ------ ------------ --------\r\n    user  TEST          False    False\r\n\r\nPARAMETER: -ExportTXT \"ReplaceMeWithAnyMultiLineCustomField\"\r\n    Name of a multi-line customfield you'd like to export the results to.\r\n.EXAMPLE\r\n    -ExportTXT \"ReplaceMeWithAnyMultiLineCustomField\"\r\n    Name  Domain LocalAccount Disabled\r\n    ----  ------ ------------ --------\r\n    user  TEST          False    False\r\n\r\nPARAMETER: -ExportCSV \"ReplaceMeWithAnyMultiLineCustomField\"\r\n    Name of a multi-line customfield you'd like to export the results to.\r\n.EXAMPLE\r\n    -ExportCSV \"ReplaceMeWithAnyMultiLineCustomField\"\r\n    Name  Domain LocalAccount Disabled\r\n    ----  ------ ------------ --------\r\n    user  TEST          False    False\r\n\r\n.OUTPUTS\r\n    None\r\n.NOTES\r\n    Minimum OS Architecture Supported: Windows 7, Windows Server 2008\r\n    Release Notes: Renamed script, added Script Variable support, added support for showing results of only 1 or more specific users.\r\nBy using this script, you indicate your acceptance of the following legal terms as well as our Terms of Use at https:\/\/www.ninjaone.com\/terms-of-use.\r\n    Ownership Rights: NinjaOne owns and will continue to own all right, title, and interest in and to the script (including the copyright). NinjaOne is giving you a limited license to use the script in accordance with these legal terms. \r\n    Use Limitation: You may only use the script for your legitimate personal or internal business purposes, and you may not share the script with another party. \r\n    Republication Prohibition: Under no circumstances are you permitted to re-publish the script in any script library or website belonging to or under the control of any other software provider. \r\n    Warranty Disclaimer: The script is provided \u201cas is\u201d and \u201cas available\u201d, without warranty of any kind. NinjaOne makes no promise or guarantee that the script will be free from defects or that it will meet your specific needs or expectations. \r\n    Assumption of Risk: Your use of the script is at your own risk. You acknowledge that there are certain inherent risks in using the script, and you understand and assume each of those risks. \r\n    Waiver and Release: You will not hold NinjaOne responsible for any adverse or unintended consequences resulting from your use of the script, and you waive any legal or equitable rights or remedies you may have against NinjaOne relating to your use of the script. \r\n    EULA: If you are a NinjaOne customer, your use of the script is subject to the End User License Agreement applicable to you (EULA).\r\n#&gt;\r\n\r\n[CmdletBinding()]\r\nparam (\r\n    [Parameter()]\r\n    [String]$Users,\r\n    [Parameter()]\r\n    [String]$ExportCSV,\r\n    [Parameter()]\r\n    [String]$ExportTXT\r\n)\r\n\r\nbegin {\r\n    if ($env:usersToCheck -and $env:usersToCheck -notlike \"null\") { $Users = $env:usersToCheck }\r\n    if ($env:exportCsvResultsToThisCustomField -and $env:exportCsvResultsToThisCustomField -notlike \"null\") { $ExportCSV = $env:exportCsvResultsToThisCustomField }\r\n    if ($env:exportTextResultsToThisCustomField -and $env:exportTextResultsToThisCustomField -notlike \"null\") { $ExportTXT = $env:exportTextResultsToThisCustomField }\r\n\r\n    if ($Users) {\r\n        $UsersToCheck = $Users.split(',') | ForEach-Object { $_.Trim() }\r\n        Write-Warning \"Only the following users will be checked: $UsersToCheck\"\r\n    }\r\n    function Test-IsDomainController {\r\n        if ($PSVersionTable.PSVersion.Major -ge 5) {\r\n            $OS = Get-CimInstance -ClassName Win32_OperatingSystem\r\n        }\r\n        else {\r\n            $OS = Get-WmiObject -Class Win32_OperatingSystem\r\n        }\r\n\r\n        if ($OS.ProductType -eq \"2\") {\r\n            return $True\r\n        }\r\n    }\r\n\r\n    function Test-IsAzureJoined {\r\n        $dsreg = dsregcmd.exe \/status | Select-String \"AzureAdJoined : YES\"\r\n        if ($dsreg) {\r\n            return $True\r\n        }\r\n    }\r\n\r\n    if ([System.Environment]::OSVersion.Version.Major -ge 10) {\r\n        if (Test-IsAzureJoined) { Write-Warning \"This device is Azure AD Joined, this script currently cannot detect if Azure AD Users are locked out!\" }\r\n    }\r\n}\r\nprocess {\r\n\r\n    # For Domain Controllers find the locked out account using Search-ADAccount\r\n    if (Test-IsDomainController) {\r\n        Import-Module ActiveDirectory\r\n        $LockedOutUsers = Search-ADAccount -LockedOut | Select-Object SamAccountName, LastLogonDate, PasswordExpired, Enabled\r\n    }\r\n    else {\r\n        $LockedOutUsers = if ($PSVersionTable.PSVersion.Major -ge 5) {\r\n            Get-CimInstance -ClassName Win32_Useraccount | Where-Object { $_.Lockout -eq $True } | Select-Object Name, Domain, LocalAccount, Disabled \r\n        }\r\n        else {\r\n            Get-WmiObject -Class Win32_Useraccount | Where-Object { $_.Lockout -eq $True } | Select-Object Name, Domain, LocalAccount, Disabled\r\n        }\r\n    }\r\n\r\n    if ($Users) {\r\n        $LockedOutUsers = $LockedOutUsers | Where-Object { $UsersToCheck -contains $_.Name -or $UsersToCheck -contains $_.SamAccountName } \r\n    }\r\n\r\n    if ($LockedOutUsers) {\r\n        # Output any locked out users into the activity log\r\n        Write-Warning \"Locked out users were found!\"\r\n        $LockedOutUsers | Format-Table | Out-String | Write-Host\r\n\r\n        # Export the list in CSV format into a custom field\r\n        if ($ExportCSV) {\r\n            Ninja-Property-Set $ExportCSV ($LockedOutUsers | ConvertTo-Csv -NoTypeInformation)\r\n        }\r\n\r\n        # Export the usernames into a custom field\r\n        if ($ExportTXT) {\r\n            if ($LockedOutUsers.Name) {\r\n                Ninja-Property-Set $ExportTXT ($LockedOutUsers.Name | Out-String)\r\n            }\r\n\r\n            if ($LockedOutUsers.SamAccountName) {\r\n                Ninja-Property-Set $ExportTXT ($LockedOutUsers.SamAccountName | Out-String)\r\n            }\r\n        }\r\n        Exit 1\r\n    }\r\n\r\n    Write-Host \"No locked out users detected. Please note this does NOT check Azure AD Accounts.\"\r\n    Exit 0\r\n}\r\nend {\r\n    \r\n    \r\n    \r\n}<\/pre>\n<p>&nbsp;<\/p>\n\n<div class=\"in-context-cta\"><p>Acc\u00e9dez \u00e0 plus de 700 scripts dans le Dojo NinjaOne<\/p>\n<p><a href=\"https:\/\/www.ninjaone.com\/fr\/phase-de-test-gratuit\/\">Obtenir l&rsquo;acc\u00e8s<\/a><\/p>\n<\/div>\n<h2>Description d\u00e9taill\u00e9e<\/h2>\n<p>Le script fonctionne de mani\u00e8re simple mais efficace :<\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Initialisation des param\u00e8tres<\/strong>\u00a0: Il commence par d\u00e9finir les param\u00e8tres d&rsquo;entr\u00e9e des utilisateurs, qui comprennent des options permettant de sp\u00e9cifier des utilisateurs particuliers et d&rsquo;exporter les r\u00e9sultats aux formats CSV ou TXT.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><strong>V\u00e9rification de l&rsquo;environnement<\/strong>: Le script \u00e9value ensuite l&rsquo;environnement d&rsquo;exploitation, en d\u00e9terminant s&rsquo;il s&rsquo;agit d&rsquo;un contr\u00f4leur de domaine ou d&rsquo;une station de travail, et si la machine est reli\u00e9e \u00e0 Azure AD. Ce point est crucial car il d\u00e9termine la m\u00e9thode utilis\u00e9e pour trouver les comptes bloqu\u00e9s.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><strong>D\u00e9tection de compte bloqu\u00e9<\/strong>:\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\">Pour les contr\u00f4leurs de domaine, il utilise <strong>Search-ADAccount<\/strong> pour trouver les comptes verrouill\u00e9s.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\">Pour les postes de travail, il utilise les m\u00e9thodes de la classe <strong>Win32_UserAccount<\/strong>.<\/li>\n<\/ul>\n<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><strong>V\u00e9rification s\u00e9lective des utilisateurs<\/strong>: Si des utilisateurs sp\u00e9cifiques sont indiqu\u00e9s, les r\u00e9sultats sont filtr\u00e9s en cons\u00e9quence.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><strong>R\u00e9sultats et exportation<\/strong>: Le script affiche les comptes verrouill\u00e9s et offre la possibilit\u00e9 d&rsquo;exporter ces informations au format CSV ou TXT.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><strong>Finalisation<\/strong>: Il conclut en indiquant si des comptes verrouill\u00e9s ont \u00e9t\u00e9 d\u00e9tect\u00e9s ou non.<\/li>\n<\/ul>\n<h2>Cas d&rsquo;utilisation potentiels<\/h2>\n<p>Imaginez une entreprise MSP qui g\u00e8re un r\u00e9seau avec de nombreux comptes d&rsquo;utilisateurs. Soudain, plusieurs utilisateurs signalent l&rsquo;impossibilit\u00e9 d&rsquo;acc\u00e9der \u00e0 leurs comptes. L&rsquo;entreprise MSP peut rapidement ex\u00e9cuter ce script pour identifier les comptes verrouill\u00e9s, ce qui acc\u00e9l\u00e8re consid\u00e9rablement le processus de d\u00e9pannage et de r\u00e9solution.<\/p>\n<h2>Comparaisons<\/h2>\n<p>Traditionnellement, les v\u00e9rifications de comptes verrouill\u00e9s impliquent des recherches manuelles ou l&rsquo;utilisation d&rsquo;outils distincts tels que les outils d&rsquo;administration AD. L&rsquo;approche PowerShell rationalise ce processus, offrant une solution plus int\u00e9gr\u00e9e et scriptable, efficace pour les environnements \u00e0 grande \u00e9chelle.<\/p>\n<h2>FAQ<\/h2>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"7\" data-aria-level=\"1\"><strong>Ce script peut-il v\u00e9rifier les comptes Azure AD ?<\/strong><br \/>\nNon, il est sp\u00e9cifiquement con\u00e7u pour les comptes locaux et les comptes de contr\u00f4leurs de domaine.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"8\" data-aria-level=\"1\"><strong>Ce script est-il adapt\u00e9 aux d\u00e9butants en PowerShell ?<\/strong><br \/>\nOui, il est facile \u00e0 utiliser, mais il est recommand\u00e9 d&rsquo;avoir des connaissances de base de PowerShell.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"9\" data-aria-level=\"1\"><strong>Le script peut-il \u00eatre personnalis\u00e9 ?<\/strong><br \/>\nAbsolument, il est flexible et peut \u00eatre modifi\u00e9 pour r\u00e9pondre \u00e0 des besoins particuliers.<\/li>\n<\/ul>\n<h2>Implications<\/h2>\n<p>Bien que le script soit tr\u00e8s efficace, il est important de se rappeler que les comptes verrouill\u00e9s peuvent signaler des probl\u00e8mes plus profonds, tels que des failles de s\u00e9curit\u00e9 ou une mauvaise utilisation du syst\u00e8me. L&rsquo;identification et l&rsquo;analyse en temps utile sont essentielles.<\/p>\n<h2>Recommandations<\/h2>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\">Utilisez r\u00e9guli\u00e8rement le script pour des contr\u00f4les proactifs.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\">Combinez cela avec des protocoles de s\u00e9curit\u00e9 plus \u00e9tendus.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\">Personnalisez le script en fonction des besoins particuliers de votre environnement.<\/li>\n<\/ul>\n<h2>Derni\u00e8res r\u00e9flexions<\/h2>\n<p>A une \u00e9poque o\u00f9 l&rsquo;efficacit\u00e9 et la s\u00e9curit\u00e9 sont primordiales, NinjaOne offre les outils et les capacit\u00e9s n\u00e9cessaires \u00e0 une <a href=\"https:\/\/www.ninjaone.com\/fr\/rmm\/it-operations-management-software\/\">gestion moderne de l&rsquo;informatique<\/a>. Ce script illustre comment PowerShell, un composant de la suite NinjaOne, peut \u00eatre utilis\u00e9 pour am\u00e9liorer les op\u00e9rations et la s\u00e9curit\u00e9 informatiques. L&rsquo;approche globale de la gestion informatique de NinjaOne en fait un alli\u00e9 indispensable pour naviguer dans le monde complexe de l&rsquo;informatique.<\/p>\n","protected":false},"author":35,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_lmt_disableupdate":"no","_lmt_disable":""},"operating_system":[4212],"use_cases":[4289],"class_list":["post-523029","script_hub","type-script_hub","status-publish","hentry","script_hub_category-windows","use_cases-gestion-des-utilisateurs-et-des-acces"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/script_hub\/523029","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/script_hub"}],"about":[{"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/types\/script_hub"}],"author":[{"embeddable":true,"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/comments?post=523029"}],"wp:attachment":[{"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/media?parent=523029"}],"wp:term":[{"taxonomy":"script_hub_category","embeddable":true,"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/operating_system?post=523029"},{"taxonomy":"use_cases","embeddable":true,"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/use_cases?post=523029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}