Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows Server » Enable Active Directory Recycle Bin: How to delete and restore objects using Active Directory Administrative Center

Enable Active Directory Recycle Bin: How to delete and restore objects using Active Directory Administrative Center

Posted on 20/11/202005/02/2025 Christian By Christian No Comments on Enable Active Directory Recycle Bin: How to delete and restore objects using Active Directory Administrative Center
Active Directory

In this post, you will learn “Enable Active Directory Recycle Bin: How to delete and restore objects using Active Directory Administrative Center”. Active Directory (AD) is Microsoft’s proprietary directory service and it stores information about objects on the network and makes this information easy for administrators and users to find and use. See this guide on how to remove Microsoft Exchange Server from Active Directory and also the sign-in method you are trying to use is not allowed.

Note: You can also use the following methods to restore a deleted objects and I will be discussing all this tools in a different (single) blog post. 
 - PowerShell commands
 - LDP utility
 - The ADRestore Tool

There are many methods to restore a deleted user account, computer account, and security groups from Active Directory. These objects are known collectively as security principals.

For some related content on Active Directory, see the following guides. Active Directory Authentication methods: Kerberos and NTLM, Concept of AD Computer Account, and how to create a contact in AD.

Enable AD Recycle Bin

The method involves enabling the AD Recycle Bin in order to be able to recover a user object via the ADAC.

Active Directory Recycle Bin can be activated only where all domain controllers are running Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, and on Windows Server 2019.

To enable AD Recycle bin with the ADAC, follow the steps below. Launch the AD Administrative Center.

Click on enable recycle bin by right-clicking on your domain or under the “Task”, and select Enable recycle bin.

Recycle Bin

You will be asked to confirm if you wish to perform the operation.Note: When is Active Directory Recycle Bin, it cannot be reversed (disabled).

Click on OK to enable the Recycle Bin.

Delete objects

Now, we have successfully enabled the AD Recycle Bin as shown below.

Restore objects

If you are having issues or prompted with permission errors when enabling the recycle bin, please visit this guide “how to fix insufficient access right to perform this operation“.

Active Directory

Enable AD Recycle Bin via PowerShell

Alternatively, you can also execute the following command to enable Active Directory Recycle Bin.

The following Windows PowerShell cmdlet perform the same function as the preceding procedure. Enter each cmdlet on a single line.

Enable-ADOptionalFeature -Identity 'CN=Recycle Bin Feature,CN=Optional Features,CN=Directory Service,CN=Windows NT,CN=Services,CN=Configuration,DC=techdirectarchive,DC=local' -Scope ForestOrConfigurationSet -Target 'techdirectarchive.local'
Active Directory

Step 2: Furthermore, Delete an AD User Object. Before I proceed, I would love to demonstrate the process of deleting a user account.

However, Let me work you through how a user account can be deleted in AD.

Delete a user account in Active Directory

Launch the Active Directory User and Computer Object and locate the OU and right-click on the user to delete

Delete objects

Moreover, Click on delete to delete the object as shown below.

As you can see below, the user object has been deleted.

Restore the Deleted User Account

In addition, Now that we have the AD Recycle Bin enabled. We can now restore this user using Active Directory Administrative Center (ADAC).

The Active Directory Administrative Center (ADAC) in Windows Server includes enhanced management experience features. These features ease the administrative burden for managing Active Directory Domain Services (AD DS).

Nonetheless, Now that we are sure that we have deleted this user object. Let’s proceed and have it recovered using the ADAC method.

Navigate to Start and type dsac.exe or open “Active Directory Administrative Centre” from the Server Manager as shown below

This will open the Active Directory Administrative Center (ADAC) window.

  • Consequently, In the left pane, click domain name and
  • Select the “Deleted Objects” container in the context menu.
  • Click on Restore to restore the object and that is all.

Alternatively, you can click “Restore to,” as shown in the image above, and restore it to a different OU. Object restored successfully, as shown in the image below.

Navigate to Active Directory User and Computers. Similarly, You will have to verify if the object has been restored.

  • Click on the OU and refresh it.
  • You should now see the user in the list as shown below

FAQs

What does it mean when you attempt to delete an Active Directory (AD) computer account and receive a message stating that it contains sub-objects and that deleting it will also delete other objects as shown below?


Object deletion
This means, the computer account you’re trying to delete is associated with other objects or dependencies in AD, such as: BitLocker Recovery keys information, Active Directory user accounts or group memberships, Group Policy Objects (GPOs) that apply to that computer. Also, shared resources or trust relationships tied to the computer account.

These sub-objects could be things like security groups, organizational units (OUs), or links that are connected to the computer account. If you proceed with the deletion, it will remove not just the computer account but also these associated objects or references, which may impact other components or users within your AD environment. It is vital to review the dependencies before deleting the object.

I hope you found this blog post on “Enable Active Directory Recycle Bin: How to delete and restore objects using Active Directory Administrative Center” helpful. Please let me know in the comment session if you have any questions.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Windows Server Tags:Active Directory, Active Directory Administrative Center, Active Directory Domain Services, deletion, Restore, Windows Server 2016

Post navigation

Previous Post: How to delete Organizational Unit in Active Directory
Next Post: Fix insufficient access rights to perform this operation when trying to enable Active Directory Recycle Bin

Related Posts

  • Manually resize your partition
    KB5034439 Windows Update Error: Resize WinRE Partition Windows Server
  • Account restrictions are preventing this user from signing in
    Resolve Account restrictions are preventing this user from signing in: User Account Password has expired Windows
  • windows server 1
    In-place upgrade for Windows Server 2012 to Windows Server 2019 Windows Server
  • File Share in Windows
    Create Folders and Enable File sharing on Windows Windows Server
  • Windows 10 1024x683 1
    ADK|WinPE|MDT: Deploy Windows with WDS Windows Server
  • Uninstall SQL Server 2025
    Uninstall Microsoft SQL Server 2025 from Windows Oracle/MSSQL/MySQL

More Related Articles

Manually resize your partition KB5034439 Windows Update Error: Resize WinRE Partition Windows Server
Account restrictions are preventing this user from signing in Resolve Account restrictions are preventing this user from signing in: User Account Password has expired Windows
windows server 1 In-place upgrade for Windows Server 2012 to Windows Server 2019 Windows Server
File Share in Windows Create Folders and Enable File sharing on Windows Windows Server
Windows 10 1024x683 1 ADK|WinPE|MDT: Deploy Windows with WDS Windows Server
Uninstall SQL Server 2025 Uninstall Microsoft SQL Server 2025 from Windows Oracle/MSSQL/MySQL

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • Slide1 1
    Enable or disable Secure Boot in Windows via UEFI Firmware Settings Windows
  • PXE E18 Server response timeout
    Stuck at Start PXE over IPv4: PXE-E18 Server response timeout Windows
  • WindowsServer2022
    Windows Server 2022 Capabilities: Register Windows Admin Center with Azure Windows Server
  • SysInternals
    Use Active Directory Explorer from Sysinternals Windows
  • images 2
    AnyConnect SSL VPN Client Configuration Guide Network | Monitoring
  • Feautured image DualBoot
    How to create a dual-boot setup on Windows 11 Windows
  • Manage Log Files via Logrotate
    How To Use Logrotate For Managing Log Files In Ubuntu Linux Linux
  • Feature image Wakeonlan
    How to download and use the NirSorf WakeonLan tool Network | Monitoring

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,808 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

Loading Comments...

You must be logged in to post a comment.