Active Directory Cmdlets in Windows PowerShell
Here’s a list of all the Active Directory cmdlets in Windows PowerShell that are available in Windows Server 2008 R2 with a link to Microsoft TechNet for each cmdlet for more details.
Adds one or more service accounts to an Active Directory computer.
Add-ADDomainControllerPasswordReplicationPolicy
Adds users, computers, and groups to the Allowed List or the Denied List of the read-only domain controller (RODC) Password Replication Policy (PRP).
Add-ADFineGrainedPasswordPolicySubject
Applies a fine-grained password policy to one more users and groups.
Adds one or more members to an Active Directory group.
Add-ADPrincipalGroupMembership
Adds a member to one or more Active Directory groups.
Clears the expiration date for an Active Directory account.
Disables an Active Directory account.
Disables an Active Directory optional feature.
Enables an Active Directory account.
Enables an Active Directory optional feature.
Get-ADAccountAuthorizationGroup
Gets the Active Directory security groups that contain an account.
Get-ADAccountResultantPasswordReplicationPolicy
Gets the resultant password replication policy for an Active Directory account.
Gets one or more Active Directory computers.
Gets the service accounts that are hosted by an Active Directory computer.
Get-ADDefaultDomainPasswordPolicy
Gets the default password policy for an Active Directory domain.
Gets an Active Directory domain.
Gets one or more Active Directory domain controllers, based on discoverable services criteria, search parameters, or by providing a domain controller identifier, such as the NetBIOS name.
Get-ADDomainControllerPasswordReplicationPolicy
Gets the members of the Allowed List or the Denied List of the RODC PRP.
Get-ADDomainControllerPasswordReplicationPolicyUsage
Gets the resultant password policy of the specified ADAccount on the specified RODC.
Get-ADFineGrainedPasswordPolicy
Gets one or more Active Directory fine-grained password policies.
Get-ADFineGrainedPasswordPolicySubject
Gets the users and groups to which a fine-grained password policy is applied.
Gets an Active Directory forest.
Gets one or more Active Directory groups.
Gets the members of an Active Directory group.
Gets one or more Active Directory objects.
Gets one or more Active Directory optional features.
Gets one or more Active Directory OUs.
Get-ADPrincipalGroupMembership
Gets the Active Directory groups that have a specified user, computer, or group.
Gets the root of a domain controller information tree.
Gets one or more Active Directory service accounts.
Gets one or more Active Directory users.
Get-ADUserResultantPasswordPolicy
Gets the resultant password policy for a user.
Installs an Active Directory service account on a computer.
Moves a domain controller in AD DS to a new site.
Move-ADDirectoryServerOperationasterRole
Moves operation master (also known as flexible single master operations or FSMO) roles to an Active Directory domain controller.
Moves an Active Directory object or a container of objects to a different container or domain.
Creates a new Active Director computer.
New-ADFineGrainedPasswordPolicy
Creates a new Active Directory fine-grained password policy.
Creates an Active Directory group.
Creates an Active Directory objet.
Creates a new Active Directory OU.
Creates a new Active Directory service account.
Creates a new Active Directory user.
Removes an Active Directory computer.
Remove-ADComputerServiceAccount
Removes one or more service accounts from a computer.
Remove-ADDomainControllerPasswordReplicationPolicy
Removes users, computers, and groups from the Allowed List or the Denied List of the RODC PRP.
Remove-ADFineGrainedPasswordPolicy
Removes an Active Directory fine-grained password policy.
Remove-ADFineGrainedPasswordPolicySubject
Removes one or more users from a fine-grained password policy.
Removes an Active Directory group.
Removes one or more members from an Active Directory group.
Removes an Active Directory object.
Removes an Active Directory OU.
Remove-ADPrincipalGroupMembership
Removes a member from one or more Active Directory groups.
Removes an Active Directory service account.
Removes an Active Directory user.
Changes the name of an Active Directory object.
Reset-ADServiceAccountPassword
Resets the service account password for a computer.
Restores an Active Directory object.
Gets Active Directory user, computer, and service accounts.
Modifies user account control (UAC) values for an Active Directory account.
Sets the expiration date for an Active Directory account.
Modifies the password of an Active Directory account.
Modifies an Active Directory computer.
Set-ADDefaultDomainPasswordPolicy
Modifies the default password policy for an Active Directory domain.
Modifies an Active Directory domain.
Sets the domain functional level for an Active Directory domain.
Set-ADFineGrainedPasswordPolicy
Modifies an Active Directory fine-grained password policy.
Modifies an Active Directory forest.
Sets the forest mode for an Active Directory forest.
Modifies an Active Directory group.
Modifies an Active Directory object.
Modifies an Active Directory OU.
Modifies an Active Directory service account.
Modifies an Active Directory user.
Uninstalls an Active Directory service account from a computer.
Unlocks an Active Directory account.
Hi, how are you, how can I list disabled pcs and start with a certain pattern? .. I have this but it doesn’t work, thanks
I have to do two filters together: that list by name lasa and only accounts enabled
Get-adcomputer -filter * -searchbase ” OU=TESTEOS,OU=Domain Notebooks and Users,DC=labandromaco,DC=com,DC=ar” | enable-adaccount -passThru
Get-ADComputer -Filter ‘Name -like “LASA*”‘ -Property * | Format-Table Name,OperatingSystem,OperatingSystemServicePack,OperatingSystemVersion -Wrap –Auto