WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2024 Poal.co

463
[–] 1 pt (edited )

Indians got into C level positions in the company I work for. There are fewer and fewer whites and they love outsourcing to India. Those of us left are cleaning up so much of their messes it is ridiculous. I needed 15 people added to two AD groups. They kept closing the damned tickets saying the needful was done when nothing was done. It took 4 tickets with the last one mentioned in an email CCing their manager and mine before the 5 minute task was done.

I still think users are missing so I've requested read only AD access so I can double check. So frustrating. It will probably be weeks before they toss me in the right group for access.

Oh and this isn't really my job. It's just that no one can figure out how to get users provisioned for the application I help maintain. It's insane. I'm trying to work around the non-existent official process in a way that doesn't get me fired.

[–] 0 pt

Couldn't you check group membership on your own from the command prompt via "net user username /domain"? E.g. net user bobjones /domain

[–] 1 pt

I actually don't even have access to the network for one of the three networks I have to get AD groups added for. It's frustrating. I'm trying to get that as well since I can tell this is going to be an ongoing issue.

[–] 0 pt

Thank you for the net command. At least I can use that on the two users I know need access. The problem is that I don't have a list of users. They are to be copied from two AD groups into a bunch of others across networks. It's so annoying.

[–] 0 pt

There are powershell commands you can use to export AD group membership. Something like this: https://community.spiceworks.com/t/exporting-all-ad-groups-with-members-to-csv/828952

I'm on vacation so I cant validate the exact syntax, but Get-ADGroup or Get-ADUser is going to be in the correct ballpark.