Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

get list of computers from list of users

Posted on 2014-09-16
7
Medium Priority
?
127 Views
Last Modified: 2014-09-16
Hi all, I need to run  a task against over a 100 computers. All I have is a list of names, and no computer names. How can I use the list of names to pull the entire list of matching computers using a script or some free tool? Environment is server 2008R2, machines are W7 x64.
0
Comment
Question by:xzay1967
  • 3
  • 3
7 Comments
 
LVL 35

Accepted Solution

by:
Joseph Daly earned 1000 total points
ID: 40325855
This is very tough to do and the results you will get probably wont be very accurate. There is no link in active directory between a user account and the computer that they log into. There are options to restrict what computer a user can log on to but there is nothing natively to say that user A is logged into computer X.

That being said you could try looking at the c:\users directory and seeing what the last modified folder was. Usually this will correspond to the user who is currenly logged in or logged in last.
0
 
LVL 29

Assisted Solution

by:becraig
becraig earned 1000 total points
ID: 40325862
If you just want all the windows 7 computers in your domain try something like below:

Import-Module Ac* 
Get-ADComputer -Filter {OperatingSystem -Like "Windows Server*7*"} -Property * | Format-Table Name,OperatingSystem,OperatingSystemServicePack -Wrap -Auto

Open in new window

0
 

Author Comment

by:xzay1967
ID: 40325900
Thanks for the response guys, but maybe I need to better explain what I am trying to accomplish. I am not looking for what computer a user is necessarily logged onto, but rather what computer was assigned to them. example user joe schmo with username jschmo is assigned xyjmys1.  I know I can run this individually, which I am trying to avoid lol.
0
Configuration Guide and Best Practices

Read the guide to learn how to orchestrate Data ONTAP, create application-consistent backups and enable fast recovery from NetApp storage snapshots. Version 9.5 also contains performance and scalability enhancements to meet the needs of the largest enterprise environments.

 
LVL 35

Expert Comment

by:Joseph Daly
ID: 40325901
Hmmm how are you running that individually? If you can share your process that you are currently using there may be a way to automate it.
0
 

Author Comment

by:xzay1967
ID: 40326003
When I say running individually I meant is. using a tool like LANDesk.
0
 
LVL 35

Expert Comment

by:Joseph Daly
ID: 40326027
Im trying to help you here but youre giving 1 sentence answers doesnt really give me any details that I can use to help you out.
0
 

Author Comment

by:xzay1967
ID: 40326466
My apologies, at this point we did it the old fashioned way. We use LANDesk Management Suite, so I just type a name, and it gave me the computer assigned. I knew I could do it that way, was just hoping to find some other way to pull from a list of names. I do appreciate you trying to help.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

High user turnover can cause old/redundant user data to consume valuable space. UserResourceCleanup was developed to address this by automatically deleting user folders when the user account is deleted.
The article explains the process to deploy a Self-Service password reset portal I developed a few years ago. Hopefully, it will prove useful to someone.  Any comments, bug reports etc. are welcome...
The viewer will learn how to create and use a small PHP class to apply a watermark to an image. This video shows the viewer the setup for the PHP watermark as well as important coding language. Continue to Part 2 to learn the core code used in creat…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question