Professional Documents
Culture Documents
Normally, we can find the list of local users or groups created on a windows system from User
Accounts applet in Control Panel,
Or, more in detail in Computer Management MMC, which is my favorite place when checking things
like this.
Users and Groups in Computer Management MMC
But do you know you can actually get them more effectively through a built-in command line Net?
net users
C:\Windows\system32>net users
User accounts for \\C-20130201
------------------------------------------------------
Administrator Guest Kent
The command completed successfully.
To get the very detail information about a particular user, including the password policies, login
script used, and the local groups s/he belongs to, run
net localgroup
C:\Windows\system32>net localgroup
Aliases for \\C-20130201
-----------------------------------------------
*__vmware__
*Access Control Assistance Operators
*Administrators
*Backup Operators
*Cryptographic Operators
*Distributed COM Users
*Event Log Readers
*Guests
*HelpLibraryUpdaters
*HomeUsers
*Hyper-V Administrators
*IIS_IUSRS
*Network Configuration Operators
*Performance Log Users
*Performance Monitor Users
*Power Users
*Remote Desktop Users
*Remote Management Users
*Replicator
*SQLServer2005SQLBrowserUser$C-20130201
*SQLServerMSASUser$C-20130201$MSSQLSERVER
*Users
*WinRMRemoteWMIUsers__
*WSS_ADMIN_WPG
*WSS_WPG
The command completed successfully.
What’s more powerful is that if you run the same net commands on a domain controller that hosts a
lot more user accounts, groups than a local workstation holds, such as a command like below
returns the full domain groups you have created in the same DC.
Net Group