Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows Server » Enable Active Directory Recycle Bin: How to delete and restore objects using Active Directory Administrative Center

Enable Active Directory Recycle Bin: How to delete and restore objects using Active Directory Administrative Center

Posted on 20/11/202005/02/2025 Christian By Christian No Comments on Enable Active Directory Recycle Bin: How to delete and restore objects using Active Directory Administrative Center
Active Directory

In this post, you will learn “Enable Active Directory Recycle Bin: How to delete and restore objects using Active Directory Administrative Center”. Active Directory (AD) is Microsoft’s proprietary directory service and it stores information about objects on the network and makes this information easy for administrators and users to find and use. See this guide on how to remove Microsoft Exchange Server from Active Directory and also the sign-in method you are trying to use is not allowed.

Note: You can also use the following methods to restore a deleted objects and I will be discussing all this tools in a different (single) blog post. 
 - PowerShell commands
 - LDP utility
 - The ADRestore Tool

There are many methods to restore a deleted user account, computer account, and security groups from Active Directory. These objects are known collectively as security principals.

For some related content on Active Directory, see the following guides. Active Directory Authentication methods: Kerberos and NTLM, Concept of AD Computer Account, and how to create a contact in AD.

Enable AD Recycle Bin

The method involves enabling the AD Recycle Bin in order to be able to recover a user object via the ADAC.

Active Directory Recycle Bin can be activated only where all domain controllers are running Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, and on Windows Server 2019.

To enable AD Recycle bin with the ADAC, follow the steps below. Launch the AD Administrative Center.

Click on enable recycle bin by right-clicking on your domain or under the “Task”, and select Enable recycle bin.

Recycle Bin

You will be asked to confirm if you wish to perform the operation.Note: When is Active Directory Recycle Bin, it cannot be reversed (disabled).

Click on OK to enable the Recycle Bin.

Delete objects

Now, we have successfully enabled the AD Recycle Bin as shown below.

Restore objects

If you are having issues or prompted with permission errors when enabling the recycle bin, please visit this guide “how to fix insufficient access right to perform this operation“.

Active Directory

Enable AD Recycle Bin via PowerShell

Alternatively, you can also execute the following command to enable Active Directory Recycle Bin.

The following Windows PowerShell cmdlet perform the same function as the preceding procedure. Enter each cmdlet on a single line.

Enable-ADOptionalFeature -Identity 'CN=Recycle Bin Feature,CN=Optional Features,CN=Directory Service,CN=Windows NT,CN=Services,CN=Configuration,DC=techdirectarchive,DC=local' -Scope ForestOrConfigurationSet -Target 'techdirectarchive.local'
Active Directory

Step 2: Furthermore, Delete an AD User Object. Before I proceed, I would love to demonstrate the process of deleting a user account.

However, Let me work you through how a user account can be deleted in AD.

Delete a user account in Active Directory

Launch the Active Directory User and Computer Object and locate the OU and right-click on the user to delete

Delete objects

Moreover, Click on delete to delete the object as shown below.

As you can see below, the user object has been deleted.

Restore the Deleted User Account

In addition, Now that we have the AD Recycle Bin enabled. We can now restore this user using Active Directory Administrative Center (ADAC).

The Active Directory Administrative Center (ADAC) in Windows Server includes enhanced management experience features. These features ease the administrative burden for managing Active Directory Domain Services (AD DS).

Nonetheless, Now that we are sure that we have deleted this user object. Let’s proceed and have it recovered using the ADAC method.

Navigate to Start and type dsac.exe or open “Active Directory Administrative Centre” from the Server Manager as shown below

This will open the Active Directory Administrative Center (ADAC) window.

  • Consequently, In the left pane, click domain name and
  • Select the “Deleted Objects” container in the context menu.
  • Click on Restore to restore the object and that is all.

Alternatively, you can click “Restore to,” as shown in the image above, and restore it to a different OU. Object restored successfully, as shown in the image below.

Navigate to Active Directory User and Computers. Similarly, You will have to verify if the object has been restored.

  • Click on the OU and refresh it.
  • You should now see the user in the list as shown below

FAQs

What does it mean when you attempt to delete an Active Directory (AD) computer account and receive a message stating that it contains sub-objects and that deleting it will also delete other objects as shown below?


Object deletion
This means, the computer account you’re trying to delete is associated with other objects or dependencies in AD, such as: BitLocker Recovery keys information, Active Directory user accounts or group memberships, Group Policy Objects (GPOs) that apply to that computer. Also, shared resources or trust relationships tied to the computer account.

These sub-objects could be things like security groups, organizational units (OUs), or links that are connected to the computer account. If you proceed with the deletion, it will remove not just the computer account but also these associated objects or references, which may impact other components or users within your AD environment. It is vital to review the dependencies before deleting the object.

I hope you found this blog post on “Enable Active Directory Recycle Bin: How to delete and restore objects using Active Directory Administrative Center” helpful. Please let me know in the comment session if you have any questions.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Windows Server Tags:Active Directory, Active Directory Administrative Center, Active Directory Domain Services, deletion, Restore, Windows Server 2016

Post navigation

Previous Post: How to delete Organizational Unit in Active Directory
Next Post: Fix insufficient access rights to perform this operation when trying to enable Active Directory Recycle Bin

Related Posts

  • sdf
    What is GPO and how can it be launched in Windows Windows Server
  • VMware Error Fix
    How to fix “The process cannot access the file because another process has locked a portion of the file” Virtualization
  • images 6
    Important Areas to Master on WSUS Windows Server
  • create a two way Active Directory Trust
    How to create a two-way Active Directory Trust Windows Server
  • Server Manager
    How to reinstall Server Manager and disable Server Manager at startup for all users and login users Windows Server
  • Screenshot 2020 05 26 at 18.57.25
    WDS and DHCP Deployment Scenarios: Configure DHCP Options 60, 66, and 67 Windows Server

More Related Articles

sdf What is GPO and how can it be launched in Windows Windows Server
VMware Error Fix How to fix “The process cannot access the file because another process has locked a portion of the file” Virtualization
images 6 Important Areas to Master on WSUS Windows Server
create a two way Active Directory Trust How to create a two-way Active Directory Trust Windows Server
Server Manager How to reinstall Server Manager and disable Server Manager at startup for all users and login users Windows Server
Screenshot 2020 05 26 at 18.57.25 WDS and DHCP Deployment Scenarios: Configure DHCP Options 60, 66, and 67 Windows Server

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • Root
    Change your root password: Manage the root user on your macOS Mac
  • Show or Hide File Extensions
    How to Show or Hide File Extensions on Windows 11 Windows
  • main
    How to Move OneDrive Folder to a different location in Windows Windows
  • How to Find Out Which Users Are Logged on Windows Server
    How to Find Out Which Users Are Logged on Windows Server Windows
  • FEATURE ZABBIX
    How to Install Zabbix Monitoring Tool on a Linux System Linux
  • 517443 637286201540125528 16x9 1
    User account and process management in Linux Linux
  • Remote desktop connection over udp and tcp
    Remote Desktop Connection behaviour over UDP and TCP Network | Monitoring
  • DC Name
    Install and configure Active Directory Domain Services on Windows Server Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,823 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.