Powershell - AD GUI

Posted on 2011-03-11
Medium Priority
Last Modified: 2012-05-11
I'd like to put together a script that will perform a mass disable / enable of user accounts based on OU. I don't want the end users of this script to need to manually enter the distinguished name for the said OU.

One of the tools I used in VBS was a pop up box that rendered the AD tree, basically the same as the left half of the AD Users and Computers snapin. Is there anything like that available for powershell that I can use to retrieve the DN with?
Question by:timbrigham
LVL 27

Accepted Solution

KenMcF earned 2000 total points
ID: 35109941
Take a look at PrimalForms. They have a prop version and a free comunity edition. This makes it easy to create your own powershell GUIs.

LVL 16

Expert Comment

by:Dale Harris
ID: 35109955
If you wanted to use a GUI, you could do it with PrimalForms:


Then just make your GUI once, it will show you the code for it, then you don't have to make another GUI.

You can do the free trial just for this script if you'd like.

As a workaround to a complete GUI:
I would recommend getting a list of the OU's you'd want to browse, and hardcode them into your Powershell Script.  Then have the user select it based on 1-10 or however many options you'd like to give them.


Dale Harris

Featured Post

Easily manage email signatures in Office 365

Managing email signatures in Office 365 can be a challenging task if you don't have the right tool. CodeTwo Email Signatures for Office 365 will help you implement a unified email signature look, no matter what email client is used by users. Test it for free!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

I’m willing to make a bet that your organization stores sensitive data in your Windows File Servers; files and folders that you really don’t want making it into the wrong hands.
Native ability to set a user account password via AD GPO was removed because the passwords can be easily decrypted by any authenticated user in the domain. Microsoft recommends LAPS as a replacement and I have written an article that does something …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

624 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question