我在企业环境中运行Windows XP桌面。 我怎样才能知道我属于哪个AD组?
尝试在计算机上以pipe理员身份运行gpresult /R
for RSoP摘要或gpresult /V
作为命令行的详细输出。 它应该输出这样的东西:
C:\Windows\system32>gpresult /V Microsoft (R) Windows (R) Operating System Group Policy Result tool v2.0 Copyright (C) Microsoft Corp. 1981-2001 Created On 2/10/2010 at 10:27:41 AM RSOP data for OQMSupport01\- on OQMSUPPORT01 : Logging Mode ------------------------------------------------------------ OS Configuration: Standalone Workstation OS Version: 6.1.7600 Site Name: N/A Roaming Profile: N/A Local Profile: C:\Users\- Connected over a slow link?: No COMPUTER SETTINGS ------------------ Last time Group Policy was applied: 2/10/2010 at 10:16:09 AM Group Policy was applied from: N/A Group Policy slow link threshold: 500 kbps Domain Name: OQMSUPPORT01 Domain Type: <Local Computer> Applied Group Policy Objects ----------------------------- N/A The following GPOs were not applied because they were filtered out ------------------------------------------------------------------- Local Group Policy Filtering: Not Applied (Empty) The computer is a part of the following security groups ------------------------------------------------------- System Mandatory Level Everyone Debugger Users IIS_WPG SQLServer2005MSSQLUser$OQMSUPPORT01$ACT7 SQLServerMSSQLServerADHelperUser$OQMSUPPORT01 BUILTIN\Users NT AUTHORITY\SERVICE CONSOLE LOGON NT AUTHORITY\Authenticated Users This Organization BDESVC BITS CertPropSvc EapHost hkmsvc IKEEXT iphlpsvc LanmanServer MMCSS MSiSCSI RasAuto RasMan RemoteAccess Schedule SCPolicySvc SENS SessionEnv SharedAccess ShellHWDetection wercplsupport Winmgmt wuauserv LOCAL BUILTIN\Administrators USER SETTINGS -------------- Last time Group Policy was applied: 2/10/2010 at 10:00:51 AM Group Policy was applied from: N/A Group Policy slow link threshold: 500 kbps Domain Name: OQMSupport01 Domain Type: <Local Computer> The user is a part of the following security groups --------------------------------------------------- None Everyone Debugger Users HomeUsers BUILTIN\Administrators BUILTIN\Users NT AUTHORITY\INTERACTIVE CONSOLE LOGON NT AUTHORITY\Authenticated Users This Organization LOCAL NTLM Authentication High Mandatory Level The user has the following security privileges ---------------------------------------------- Bypass traverse checking Manage auditing and security log Back up files and directories Restore files and directories Change the system time Shut down the system Force shutdown from a remote system Take ownership of files or other objects Debug programs Modify firmware environment values Profile system performance Profile single process Increase scheduling priority Load and unload device drivers Create a pagefile Adjust memory quotas for a process Remove computer from docking station Perform volume maintenance tasks Impersonate a client after authentication Create global objects Change the time zone Create symbolic links Increase a process working set
或者,如果使用ActiveDirectory PowerShell模块(或带有远程服务器pipe理工具的客户端操作系统)login到Windows Server操作系统,请尝试Get-ADPrincipalGroupMembership
cmdlet:
C:\Users\username\Documents> Get-ADPrincipalGroupMembership username | Select name name ---- Domain Users All Announcements employees_US remotes ceo-report all-engineering not-sales Global-NotSales
使用
whoami /groups
这不仅应该列出安全组,而且还应该列出分发组,如果我记得正确的话(以及哪些可能对知道有用)。 也照顾嵌套,即你是在B组中,所以它显示你也在B(同样我试图回顾这里的细节)。
在Vista和Win7本地,对于XP,你可能需要SP2的支持工具(这也需要你有足够的特权来安装它们)。 http://www.microsoft.com/downloads/details.aspx?FamilyId=49AE8576-9BB9-4126-9761-BA8011FABF38&displaylang=en
我认为你可以在cmd窗口中写入:
net user USERNAME /domain
它至less在我这里工作。
用你自己的用户名replaceUSERNAME
,不用域前缀。
开始 – 运行 – CMD – GPRESULT / r就足够了 – >不需要显示完整的“/ v”来将群组所有物作为客户端用户可视化,就AD而言(当然是在Windows 7下)不知道有关winxp)
如果您无法访问AD:
开始 – 运行 – CMD – GPRESULT / v
您将在最后看到: 用户是以下安全组的一部分
如果你正在寻找速度,那么gpresult是慢慢的…特别是如果有很多GPO的应用。
只需运行下列其中一项,一项针对本地群组,另一项针对域组:
本地 – 'c:\ windows \ system32 \ net.exe localgroup' +'要检查的组的名称'
域 – 'c:\ windows \ system32 \ net.exe组/域' +'要检查的组的名称'
然后parsing你正在查找的用户名的输出结果将列出该组中的用户。 希望这可以帮助。
完全相信格雷格Bray的答案…如果结果超过屏幕大小,你需要看到所有的,使用方便的redirect(pipe)命令 :“ >
”将结果写入文件。
所以会变成这样的:
C:\Windows\system32>gpresult /V >c:\group_details.txt