jumpcloud-ADMU
mobile_to_local
jumpcloud-ADMU | mobile_to_local | |
---|---|---|
4 | 5 | |
21 | 51 | |
- | - | |
8.3 | 4.8 | |
21 days ago | 10 days ago | |
PowerShell | Swift | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
jumpcloud-ADMU
-
moving away from mobile / AD binded accounts to local accounts
Ive only ever done it using the JumpCloud converter agent https://github.com/TheJumpCloud/jumpcloud-ADMU/wiki
-
2 Windows 11 machines ADMU failure
i would double/triple check that the profile they’re trying to migrate is not logged into. an example screenshot on what they should see on https://github.com/TheJumpCloud/jumpcloud-ADMU/wiki/Convert-Profile - Currently Active should = False for whatever profile they’re targeting. if this is not the issue, we encourage them to check the logs at C:\windows\temp\JCADMU.log file & then review the error messages to determine root cause
- Convert Windows domain profile to a local user profile
- How do I responsibly remove Active Directory and go domainless?
mobile_to_local
- moving away from mobile / AD binded accounts to local accounts
-
Issues with AD mobile accounts - macOS 13.x
But to your question about fixing the issue at hand, this is a good tool for demobilizing - https://github.com/BIG-RAT/mobile_to_local
-
De-mobilization scripts?
My recommendation would be to use something like Mobile to Local to accomplish this.
-
Migration with AD User to Local User
Check out Mobile to Local.
-
Convert AD Account to Mobile AD Account
There a plenty of scripts and things out there, but I’m a fan of this tool because it has a GUI and automates the whole process https://github.com/BIG-RAT/mobile_to_local
What are some alternatives?
Minimalistic-offensive-security-tools - A repository of tools for pentesting of restricted and isolated environments.
vulnerable-AD - Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
Testimo - Testimo is a PowerShell module for running health checks for Active Directory against a bunch of different tests
AutomatedLab - AutomatedLab is a provisioning solution and framework that lets you deploy complex labs on HyperV and Azure with simple PowerShell scripts. It supports all Windows operating systems from 2008 R2 to 2022, some Linux distributions and various products like AD, Exchange, PKI, IIS, etc.
mistborn
PowerShell - PowerShell functions and scripts (Azure, Active Directory, SCCM, SCSM, Exchange, O365, ...)
Pode - Pode is a Cross-Platform PowerShell web framework for creating REST APIs, Web Sites, and TCP/SMTP servers