Solved

Get-QADGroupMember and Include other Attributes

Posted on 2014-04-02
3
966 Views
Last Modified: 2014-04-09
I need to list all users of a Group, and include the Name, SamAccountName, EmployeeID, Manager

When I run Get-QADGroupMember "Group Name" | Name, SamAccountName, EmployeeID, Manager

It returns all values except the EmployeeID, how can I fix this?
0
Comment
Question by:fireguy1125
  • 2
3 Comments
 
LVL 40

Expert Comment

by:Subsun
ID: 39972789
You can try..
Get-QADGroupMember "Group Name" -IncludedProperties employeeID | Select Name, SamAccountName, EmployeeID, Manager

Open in new window

or
Get-QADGroupMember "Group Name" | Get-Qaduser -IncludedProperties employeeID | Select Name, SamAccountName, EmployeeID, Manager

Open in new window

0
 
LVL 1

Author Comment

by:fireguy1125
ID: 39972842
Thanks - when listing the Manager, i see it returns the full DN value - is there any way to have the result so it is the name?
0
 
LVL 40

Accepted Solution

by:
Subsun earned 500 total points
ID: 39974541
You could create a custome property for that.. For example..
Get-QADGroupMember "Group Name" -IncludedProperties employeeID | Select Name, SamAccountName, EmployeeID,@{N="Manager";E={(Get-QadUser $_.Manager).DisplayName}}

Open in new window

0

Featured Post

Are your AD admin tools letting you down?

Managing Active Directory can get complicated.  Often, the native tools for managing AD are just not up to the task.  The largest Active Directory installations in the world have relied on one tool to manage their day-to-day administration tasks: Hyena. Start your trial today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A brief introduction to what I consider to be the best editor for PowerShell.
The following article is intended as a guide to using PowerShell as a more versatile and reliable form of application detection in SCCM.
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question