Lusrmgr.exe

foreach (DirectoryEntry user in users.Children)

# Add to group Add-LocalGroupMember -Group $GroupName -Member $UserName lusrmgr.exe

$SecurePassword = Read-Host "Enter password" -AsSecureString New-LocalUser -Name "ServiceAccount" -Password $SecurePassword Automation Script Example # Complete user provisioning script param( [Parameter(Mandatory=$true)] [string]$UserName, [string]$FullName, [string]$GroupName = "Users" ) Elevation check if (!([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) Start-Process powershell.exe -ArgumentList "-NoProfile -ExecutionPolicy Bypass -File "$PSCommandPath " $UserName $FullName $GroupName" -Verb RunAs exit foreach (DirectoryEntry user in users

Write-Host "User $UserName created successfully" -ForegroundColor Green catch Write-Host "Error: $_" -ForegroundColor Red new object[] newUser.Path )

// Add to group DirectoryEntry adminGroup = localMachine.Children.Find("Administrators", "Group"); adminGroup.Invoke("Add", new object[] newUser.Path ); ' VBScript example Set objWMIService = GetObject("winmgmts:impersonationLevel=impersonate!\\.\root\cimv2") ' List users Set colAccounts = objWMIService.ExecQuery("SELECT * FROM Win32_UserAccount WHERE LocalAccount=True") For Each objAccount in colAccounts WScript.Echo objAccount.Name & " - " & objAccount.FullName Next

if (user.SchemaClassName == "User")

# Configure properties Set-LocalUser -Name $UserName -PasswordNeverExpires $false -UserMayChangePassword $true