<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>groups</title><link>https://evotec.xyz/fr/tags/groups</link><description>Evotec Main Website</description><atom:link href="https://evotec.xyz/fr/tags/groups/index.xml" rel="self" type="application/rss+xml" /><item><title>Reporting group membership for critical Active Directory groups</title><link>https://evotec.xyz/fr/blog/reporting-group-membership-for-critical-active-directory-groups</link><description>I work a lot with Active Directory-related tasks. One of the tasks is to know the group membership of critical Active Directory Groups such as Domain Admins, Enterprise Admins, Schema Admins, Event Log Readers, and a few others that are a bit less known. As I did it, I got bored of typing the group names repeatedly and decided that enough was enough and there must be an easier way for me to do that.</description><pubDate>Sun, 07 Aug 2022 11:57:28 GMT</pubDate><guid>https://evotec.xyz/fr/blog/reporting-group-membership-for-critical-active-directory-groups</guid><category>active directory</category><category>ad</category><category>group membership</category><category>groups</category><category>nested groups</category><category>powershell</category><category>Windows</category></item><item><title>Monitoring Active Directory Changes on Users and Groups with PowerShell</title><link>https://evotec.xyz/fr/blog/monitoring-active-directory-changes-on-users-and-groups-with-powershell</link><description>Working as Administrator with Active Directory can be rewarding. You can easily deploy new settings, make changes to users even…</description><pubDate>Fri, 23 Mar 2018 10:01:43 GMT</pubDate><guid>https://evotec.xyz/fr/blog/monitoring-active-directory-changes-on-users-and-groups-with-powershell</guid><category>active directory</category><category>event id</category><category>event log</category><category>event viewer</category><category>events</category><category>group membership</category><category>groups</category><category>monitoring</category><category>powershell</category><category>security events</category><category>user changes</category><category>Windows</category></item></channel></rss>