WatchGuard DNSWatch reduces malware infections by detecting and blocking malicious DNS requests, improving your ability to protect employees from phishing attacks. Learn more about our newest service included in Total Security Suite today!
$group = "cn=group1,CN=users,DC=local,DC=com"
$user = Get-QADUser -SearchRoot "CN=users,DC=local,DC=com" -Enabled -SizeLimit 0 -Service 'server.local.com:389'| where{ $_.description -like "B*"}
Add-QADGroupMember -identity $group -Member $user
$filter = "(&(objectCategory=person)(objectClass=user)(description=B*))"
$scope = "CN=users,DC=local,DC=com"
$Group = Get-QADGroup -Identity "Group1"
$password = Get-Content C:\scripts\password.txt | ConvertTo-SecureString
$connAccount = 'local.com\administrator'
$resultSize = 0
# Connect to Active Directory
Connect-QADService -ConnectionAccount $connAccount -ConnectionPassword $password
# Clear group
[void](Set-QADGroup -Identity $Group.DN -Member $NULL)
# Get all enabled Active Directory accounts and add them to the group
Get-QADUser -SearchRoot $scope `
-Enabled `
-DontUseDefaultIncludedProperties `
-IncludedProperties DN `
-LdapFilter $filter `
-SizeLimit $resultSize | ForEach-Object {
[void](Add-QADGroupMember -Identity $Group.DN -Member $_.DN )
}
# Disconnect from Active Directory
Disconnect-QADService
Import-module activedirectory
$users = Get-ADUSER -filter {description -like 'b*'}
ForEach ($user in $users)
{
Add-ADGroupMember -Identity "CN=00000-000,OU=Test_OU,DC=contoso,DC=local" -Members $user.distinguishedName
}
Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.
Have a better answer? Share it in a comment.
Join the community of 500,000 technology professionals and ask your questions.