<feed xmlns="http://www.w3.org/2005/Atom"><title>groups</title><id>https://evotec.xyz/es/tags/groups/index.atom.xml</id><updated>2022-08-07T11:57:28.0000000Z</updated><subtitle>Evotec Main Website</subtitle><link href="https://evotec.xyz/es/tags/groups" /><link href="https://evotec.xyz/es/tags/groups/index.atom.xml" rel="self" type="application/atom+xml" /><entry><title>Reporting group membership for critical Active Directory groups</title><id>https://evotec.xyz/es/blog/reporting-group-membership-for-critical-active-directory-groups</id><link href="https://evotec.xyz/es/blog/reporting-group-membership-for-critical-active-directory-groups" /><updated>2022-08-07T11:57:28.0000000Z</updated><summary>I work a lot with Active Directory-related tasks. One of the tasks is to know the group membership of critical Active Directory Groups such as Domain Admins, Enterprise Admins, Schema Admins, Event Log Readers, and a few others that are a bit less known. As I did it, I got bored of typing the group names repeatedly and decided that enough was enough and there must be an easier way for me to do that.</summary><category term="active directory" /><category term="ad" /><category term="group membership" /><category term="groups" /><category term="nested groups" /><category term="powershell" /><category term="Windows" /></entry><entry><title>Monitoring Active Directory Changes on Users and Groups with PowerShell</title><id>https://evotec.xyz/es/blog/monitoring-active-directory-changes-on-users-and-groups-with-powershell</id><link href="https://evotec.xyz/es/blog/monitoring-active-directory-changes-on-users-and-groups-with-powershell" /><updated>2018-03-23T10:01:43.0000000Z</updated><summary>Working as Administrator with Active Directory can be rewarding. You can easily deploy new settings, make changes to users even…</summary><category term="active directory" /><category term="event id" /><category term="event log" /><category term="event viewer" /><category term="events" /><category term="group membership" /><category term="groups" /><category term="monitoring" /><category term="powershell" /><category term="security events" /><category term="user changes" /><category term="Windows" /></entry></feed>