Dear Khushboo Kumari,
My name is Hoang Phan, and I understand that you are having some concern related to nested security group.
I found a script on an external site that can help identify circular nested groups. I tested it in my environment, and it works for simple cases. Please try it in your test environment first to see if it meets your needs:
Cleaning these nested groups is more complex, as groups can be linked to AD permissions, GPO filtering, file shares, and NTFS permissions. Before making changes, document all permissions and where the groups are used.
Recommended steps:
- Map group usage – Check file/folder permissions (
icaclsorGet-Acl), share permissions, app roles, and GPO filtering. - Assess impact – Create a report of effective permissions and note which users would lose access if groups are flattened.
- Plan cleanup – Remove redundant memberships, create new flat groups if needed, and populate them with correct users.
- Test first – Duplicate groups in a test OU/lab, apply changes to a small set of users, and verify access.
- Migrate in phases – Add new groups alongside old ones, then remove old groups only after validation.
- Document & monitor – Keep track of changes, and monitor Event Logs and tickets for any access issues.
I hope this information proves helpful. Please don’t hesitate to reach out if you need further clarification—I’ll be happy to assist 🙂
If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.
Best regards,
Hoang Phan