Lusrmgr.exe -

$SecurePassword = Read-Host "Enter password" -AsSecureString New-LocalUser -Name "ServiceAccount" -Password $SecurePassword Automation Script Example # Complete user provisioning script param( [Parameter(Mandatory=$true)] [string]$UserName, [string]$FullName, [string]$GroupName = "Users" ) Elevation check if (!([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) Start-Process powershell.exe -ArgumentList "-NoProfile -ExecutionPolicy Bypass -File "$PSCommandPath " $UserName $FullName $GroupName" -Verb RunAs exit

if (user.SchemaClassName == "User")

string username = user.Name; string fullname = user.Properties["FullName"].Value?.ToString(); lusrmgr.exe

# Add to group Add-LocalGroupMember -Group $GroupName -Member $UserName newUser.Properties["FullName"].Value = "John Doe"

Write-Host "Run as Administrator required" -ForegroundColor Red exit 1 new object[] "P@ssw0rd" )

// Create user DirectoryEntry newUser = localMachine.Children.Add("JohnDoe", "User"); newUser.Properties["FullName"].Value = "John Doe"; newUser.Invoke("SetPassword", new object[] "P@ssw0rd" ); newUser.CommitChanges();

# Configure properties Set-LocalUser -Name $UserName -PasswordNeverExpires $false -UserMayChangePassword $true