How to Get AD Users Password Expiration Date

In this guide, I’ll show you how to get the password expiration date for Active Directory User Accounts. This is very easy to do.

I will provide a few examples that go over how to get this information for a single user and how to get the expiration date for all AD users.

PowerShell Get All Users Password Expiration Date

In this example, I’ll use the get-aduser PowerShell cmdlet to get all users password expiration date.

  1. Open PowerShell:

    Copy and paste the script below:

    Get-ADUser -filter {Enabled -eq $True -and PasswordNeverExpires -eq $False} –Properties "DisplayName", "msDS-UserPasswordExpiryTimeComputed" |
    Select-Object -Property "Displayname",@{Name="ExpiryDate";Expression={[datetime]::FromFileTime($_."msDS-UserPasswordExpiryTimeComputed")}}
  2. Export the list:

    To export the list add this to the end of the command.

    export-csv -path c:\temp\passwordexpiration.csv

Option #2 AD Reporting Tool

In this example, I’ll use the AD Reporting Tool that is included in the AD Pro Toolkit. The toolkit includes over 200 built-in reports.

Step 1: Click on User Reports -> Users password expiration date and click Run. Click browse to select an OU or group.

Step 2. To export the list click the export button.

How to Check Password Expiration Date for a Single User

To get the password expiration date for a specific user run this command.

In this example, I’m checking the date for user “robert.allen”.

Get-ADUser -identity robert.allen –Properties "DisplayName", "msDS-UserPasswordExpiryTimeComputed" |
Select-Object -Property "Displayname",@{Name="ExpiryDate";Expression={[datetime]::FromFileTime($_."msDS-UserPasswordExpiryTimeComputed")}}

Get Password Expiration Date for Users in an Organizational Unit

To get only users in an OU you will need to use the -SearchBase option and the distinguishedName of the OU.

In this example, I’ll get all users from my Management OU.

Get-ADUser -filter * -SearchBase "OU=Management,OU=ADPRO Users,DC=ad,DC=activedirectorypro,DC=com" –Properties "DisplayName", "msDS-UserPasswordExpiryTimeComputed" | Select-Object -Property "Displayname",@{Name="ExpiryDate";Expression={[datetime]::FromFileTime($_."msDS-UserPasswordExpiryTimeComputed")}}

Get Passwords Expiring in the Next 30 Days

With the AD Pro Toolkit, you can choose a time frame for when passwords will be expiring.

Click the Time button and choose the time frame.

Now you will see a list of users that that has a password expiring in the next 30 days.

Password Expiration Email Notification

To get an automated email report of password expiration dates use the built in task scheduler.

Click on Scheduler and then click Add to create an automated report.

Click here to download a free trial of the AD Pro Toolkit.

The toolkit’s Active Directory Reporting Software includes over 200 built-in reports on users, computers, groups, and more.

Using the Net User command to Display Password expiresDate

This last method uses the built in net user command to display a users password expiration date. This is useful to quickly check the password expires date for a single domain user account.

Open the windows command prompt and type the command below.

Net user USERNAME /domain

In this example, I’ll use the account robert.allen.

In addition to displaying the password expires date it also provides other useful information such as password last set, when the password can be changed if the account is active, and so on.


I’ve worked as a System Administrator for years and I’ve never had the need to create a report on users password expiration date. With that said this article is one of the most popular tutorials on my website, so I guess there is a need for it. You should have no problem generating a password expiration date for all domain user accounts using one of the methods from this article.

I’d love to hear your feedback on the use case for this report. Do your computers not notify users the password will expire in x days?

71 thoughts on “How to Get AD Users Password Expiration Date”

  1. I copied/pasted the powershell script on a Server 2016 machine. Some users reported expiry correctly, but most users reported expiry at 12/31/1600 at 5pm. Users report correctly using net user /domain. What could be wrong?

  2. Not sure what I’m doing wrong – I’ve checked the comments and do not see anyone reporting the same issue – except maybe the most recent comment., and that one was only ‘really close’…
    When I copy and past your script into powershell, I get a list of all of the users in AD along with corresponding pw expiration dates. However, the ONLY person whose date is correct is the person that changed his password today. Everyone else shows an expiration date of:

    I’m happy to provide a screenshot if that might help – assistance would be appreciated.


    • 12/31/1600 is null The “zero” date for LargeInteger datetime. Open the user in ADUC and check the pwdLastSet attribute and see if it is set to 0.

  3. When I run Method #1 I get for most of the users null passworddlastset and Passworddneverexpires as it seems it doesn’t find the field in table {[datetime]::FromFileTime($_.”msDS-UserPasswordExpiryTimeComputed”)}
    or it will return date 01/01/01601
    but it does return an expiration date when running the Net User command
    Is there another field name we can query

    • Double check your command syntax. In your comment the attributes are spelled wrong.

      get-aduser -filter * -properties passwordlastset, passwordneverexpires |ft Name, passwordlastset, Passwordneverexpires

  4. Is there any way in which we can ask users to reset the password. The AD is configured in the VM and LDAP is setup within the VM. We wanted to make it simple for the users by providing the link in email where one user can go and re-set the AD Password. Can you please provide the out of the box url or confirm if i need to write the code to the same.

    • There is no out of the box URL for resetting passwords, you would need a 3rd party solution. On a windows computer, users can change their own password by using control-alt-delete and then selecting change password.

  5. Hi Robert.
    Great script very helpful, I could not see if this question has been asked/answered already however, is there a way to target a AD group using method 1 to get a specific group such as Net user “group-name” /domain to pull a list of all users from that group with their password expiry dates?

    Kind regards

  6. How is it possible to check expiracy for group of users. So instead of either all or just 1 user – i would like to check like user1, user 2 and user 3 – instead of have check one at a time

  7. It’s a nice script, but we have so many users that I like to do the following:

    -Filter to only show users with password expriring within 7 days from today (we have fine-grained password policies)
    -Output as JSON (on console)

    For me, that is quite hard to do, for you guys not I guess, can you show me how ?

    • Hi Vincent below code should work for that:

      $targetDays = 10
      $targetDate = (Get-Date).AddDays($targetDays)
      Write-Host “Password-Expiration Date before:” $targetDate

      # Shows Password expiration Date of Domain (“”) where expiry date is less then 10 days from today
      Get-ADUser -filter {Enabled -eq $True -and PasswordNeverExpires -eq $False} –Properties “DisplayName”, “msDS-UserPasswordExpiryTimeComputed” -Server “” |
      Select-Object -Property “Displayname”,@{Name=”ExpiryDate”;Expression={[datetime]::FromFileTime($_.”msDS-UserPasswordExpiryTimeComputed”)}} |
      Where-Object ExpiryDate -lt $targetDate | Sort DisplayName

  8. Nice, trying to filter on “ExpiryDate” but can’t get that work.
    usecase: I want to generate a file of users which have a password experation 5, 4, 3, 2 or 1 day from now.

  9. Is there a way to display the date in chronological order? I’m getting the expiration date report but not in order by date. Thank you in advance.

  10. I’m still having trouble getting it to sort by date. It’ll sort alphabetically when I do a sort-object, but expiry just puts them in a random order each time, even though the command runs. Any suggestions?

  11. Thanks for sharing this stuff. I have one question

    The expiry time it shows, in which time zone is it, central time ? or the time zone set on the server ?

  12. Thanks for sharing this, its helpful.
    Is it possible to trim the expiration date..? Just want the date, without time. if so, can you please help with that..?

  13. I am using the following commandlet to get the list of last password set and then using a variable to get the value and add -365 to it, however this variable is not getting populated.
    I can see the commandlet work and output values but the variable I am using $PWdLastSet.passwordlastset is not getting any value, am I doing something wrong ?

    $PWdLastSet = get-aduser -filter * -properties passwordlastset, passwordneverexpires -SearchBase “OU=Service Accounts,OU=SG1,OU=AT,DC=wt,DC=ad,DC=cit,DC=cc” |ft Name, passwordlastset, Passwordneverexpires

    $expiredDate = $PWdLastSet.passwordlastset.addDays(-365)

  14. I seem to be having an issue using the -searchbase in the Method-2 above. I keep getting a message ” A parameter cannot be found that matches parameter name ‘SearchBase’. ” Is this possibly a location issue where I am not putting it in the correct location within the Method-2 command?

    • Use the -server to specify the domain server instance

      Get-ADUser -Filter “Name -eq ‘ChewDavid'” -SearchBase “DC=AppNC” -Properties “mail” -Server

    • Here is an example for a specific user

      get-aduser -Identity Alonso.Hall -properties passwordlastset, passwordneverexpires |ft Name, passwordlastset, Passwordneverexpires

  15. If there are multiple OU’s and you want to find the expiring passwords for a specific OU, how would you do that? I’m guessing with ‘-searhbase’, but not sure how. – Thanks

  16. Something useful from Method 1:

    $m=’Password expires’;($MyExp = net user $env:USERNAME /domain | %{if($_ -match $m){get-date ($_ -replace $m,”).trim()}});rv m;

  17. Hi, how do I query if the password change was successful through powershell?
    thanks for this site by the way, it helped guide me quite alot! 🙂

  18. Is there a field like Enabled that we can use to filter out this where this isn’t set for the user that shows up “12/31/1600 7:00:00 PM”.

    • Yes use the below code to return just the enabled users

      get-aduser -filter {Enabled -eq $TRUE} -properties passwordlastset, passwordneverexpires |ft Name, passwordlastset, Passwordneverexpires

      • Any help on getting the sorting corrected?

        Get-ADUser -filter {Enabled -eq $True -and PasswordNeverExpires -eq $False} -Properties “DisplayName”, “msDS-UserPasswordExpiryTimeComputed” |
        >> Select-Object -Property “Displayname”,@{Name=”ExpiryDate”;Expression={[datetime]::FromFileTime($_.”msDS-UserPasswordExpiryTimeComputed”) | Sort-Object -property ExpiryDate -Descending}}

        Sort-Object -property ExpiryDate -Descending <does not sort correctly

  19. The second method is more accurate if you have Fine-grained Password Policies enabled in the domain.

    Net Use only shows the result from the Default Domain Policy.

  20. So I have a separate OU users in a different user that I want to see when there password expires.
    Were would I make the change for this with in a domain tree?

    • How do I get the expiration date for few users that I have in a csv format using method 2? I know the command mentioned in here will give me the list of all the users in my org.


Leave a Comment