Browse by Tags

Tagged Content List
  • Wiki Page: ADDS PowerShell (CMDLET, ADSI & .Net) to Expedite Your Tasks

    Table of Contents CMDLET ADSI PowerShell ADSI(Active Directory Services Interface) commands 2. How to find the Group members for a Group. 3. Listing an OU Contents 4. Finding FSMO using .Net Namespace "System.DirectoryServices" 5. Finding All attributes & Properties How to get the Property...
  • Wiki Page: Active Directory: Characters to Escape

    Almost any characters can be used in distinguished names in Active Directory. However, some characters must be escaped with the backslash "\" escape character. Table of Contents Active Directory ADSI Non-Keyboard Characters VBScript PowerShell PowerShell New-AD* Cmdlets ADsPath LDAP Filters...
  • Wiki Page: Create User in AD and make it appear in SBS User Console in 6 steps

    Table of Contents Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Sometimes you create a new user via Active Directory Users and Services instead of creating it through the SBS user creation wizard. Now this is how to make it appear into you SBS user console. Step 1 Open ADSI Edit ...
  • Wiki Page: Working with Active Directory using PowerShell ADSI adapter

    Introduction PowerShell is very useful for automating Active Directory. It allows to quickly and relatively easy automate mundane actions or perform same operations with many objects. PowerShell provides very broad set of methods to work with Active Directory. There is some of them: Microsoft...
  • Wiki Page: VBScript: Find out Who Owns Your Computers

    There are times when what you really want to know about a given computer is, who’s responsible for it. With good user education, your OU admins or computer admins will pre-stage a computer and at the very least populate the ManagedBy property. This effectively lets anyone who can read that property...
  • Wiki Page: How to Find Enabled Accounts on Domain Joined Computers.

    Back in February I was notified that one of the computers that we're responsible for had been compromised by Torpig . The way I understand it is the user launches a website that might be a part of a phishing scam, and the software gets dropped on their computer. Once installed it searches through...
Page 1 of 1 (6 items)
Can't find it? Write it!