Verify local administrator rights across remote endpoints in seconds. Detect unauthorized privilege escalation and validate LAPS functionality without interrupting the user.
SEE HOW IT WORKS[UHDC] Connecting to LAPTOP-US-4829 via WinRM...
--- Administrators Group Members ---
> LAPTOP-US-4829\Administrator
Type: User | Source: Local
> ACME\Domain Admins
Type: Group | Source: ActiveDirectory
> ACME\jsmith
Type: User | Source: ActiveDirectory
Active Directory only shows what domain groups a user belongs to. It cannot tell you if a local IT technician manually added a user's domain account directly to the local SAM database of a specific laptop. The UHDC bridges this visibility gap.
Bypasses Active Directory assumptions to query the actual hardware's Security Account Manager (SAM) database, providing absolute truth regarding local endpoint privileges.
Clearly distinguishes between local machine accounts (like the built-in Administrator) and Active Directory domain accounts, making it easy to spot unauthorized domain users.
Runs entirely in the background via WinRM. You can audit a machine for suspicious activity or verify LAPS functionality without the user ever knowing you are connected.
While the UHDC uses PowerShell in the background to parse and format the data, a junior technician should know how to audit local groups manually using classic command-line tools. The training engine teaches them how to utilize Sysinternals PsExec to remotely execute the native net localgroup command to instantly list all members of the local Administrators group.
Opening Computer Management (compmgmt.msc), navigating to Local Users and Groups -> Groups, and double-clicking 'Administrators'. Alternatively, opening a local command prompt and typing: net localgroup administrators
PrincipalSource tells you where the account originates. If it says Local, the account exists only on that specific computer's hard drive (like the built-in 'Administrator' account). If it says ActiveDirectory, it is a domain account (like 'ACME\jsmith') that has been granted local privileges.