+--------------------------------------------------------------------------------+
+                            Active Directory Status                             +
+--------------------------------------------------------------------------------+
Active Directory is ENABLED


+--------------------------------------------------------------------------------+
+                           Active Directory Settings                            +
+--------------------------------------------------------------------------------+
Domain:                 gsslinc.local
Workgroup:              NAS01
Bind name:              Administrator
UNIX extensions:        0
Trusted domains:        1
SSL:                    off
Timeout:                60
DNS Timeout:            60
Domain controller:      srv-nsc.gsslinc.local
Global Catalog Server:  srv-nsc.gsslinc.local


+--------------------------------------------------------------------------------+
+                                 /etc/krb5.conf                                 +
+--------------------------------------------------------------------------------+
[appdefaults]
            pam = {
                forwardable = true
                ticket_lifetime = 86400
                renew_lifetime = 86400
            }

[libdefaults]
            dns_lookup_realm = true
            dns_lookup_kdc = true
            ticket_lifetime = 24h
            clockskew = 300
            forwardable = yes

[domain_realm]
            gsslinc.local = GSSLINC.LOCAL
            .gsslinc.local = GSSLINC.LOCAL
            GSSLINC.LOCAL = GSSLINC.LOCAL
            .GSSLINC.LOCAL = GSSLINC.LOCAL

[realms]
        GSSLINC.LOCAL = {
            kdc = srv-shu.gsslinc.local:88
            admin_server = srv-shu.gsslinc.local:88
            kpasswd_server = srv-shu.gsslinc.local:464
            default_domain = GSSLINC.LOCAL
        }

[logging]
            default = SYSLOG:INFO:LOCAL7



+--------------------------------------------------------------------------------+
+                               /etc/nsswitch.conf                               +
+--------------------------------------------------------------------------------+
services: files
rpc: files
group: files winbind
shells: files
passwd: files winbind
hosts: files mdns dns
sudoers: files
networks: files
protocols: files


+--------------------------------------------------------------------------------+
+                            /usr/local/etc/smb4.conf                            +
+--------------------------------------------------------------------------------+
[global]
    server max protocol = SMB3
    interfaces = 127.0.0.1 192.168.17.5 192.168.17.70
    bind interfaces only = yes
    encrypt passwords = yes
    dns proxy = no
    strict locking = no
    oplocks = yes
    deadtime = 15
    max log size = 51200
    max open files = 588908
    load printers = no
    printing = bsd
    printcap name = /dev/null
    disable spoolss = yes
    getwd cache = yes
    guest account = nobody
    map to guest = Bad User
    obey pam restrictions = yes
    directory name cache size = 0
    kernel change notify = no
    dfree command = /usr/local/libexec/samba/dfree
    panic action = /usr/local/libexec/samba/samba-backtrace
    nsupdate command = /usr/local/bin/samba-nsupdate -g
    server string = FreeNAS Shared Data Server
    ea support = yes
    store dos attributes = yes
    hostname lookups = yes
    unix extensions = no
    time server = yes
    acl allow execute always = true
    acl check permissions = true
    dos filemode = yes
    multicast dns register = no
    domain logons = yes
    idmap config *: backend = tdb
    idmap config *: range = 90000001-100000000
    server role = member server
    netbios name = NAS01
    workgroup = GSSLINC
    realm = GSSLINC.LOCAL
    security = ADS
    client use spnego = yes
    cache directory = /var/tmp/.cache/.samba
    local master = no
    domain master = no
    preferred master = no
    winbind cache time = 7200
    winbind offline logon = yes
    winbind enum users = yes
    winbind enum groups = yes
    winbind nested groups = yes
    winbind use default domain = yes
    winbind refresh tickets = yes
    idmap config GSSLINC: backend = rid
    idmap config GSSLINC: range = 20000-90000000
    allow trusted domains = yes
    client ldap sasl wrapping = plain
    template shell = /bin/sh
    template homedir = /home/%U
    pid directory = /var/run/samba
    smb passwd file = /var/etc/private/smbpasswd
    private dir = /var/etc/private
    create mask = 0666
    directory mask = 0777
    client ntlmv2 auth = yes
    dos charset = CP437
    unix charset = UTF-8
    log level = 1
    

[Data]
    path = /mnt/User_Data
    comment = Shared Data
    printable = no
    veto files = /.snapshot/.windows/.mac/.zfs/
    writeable = yes
    browseable = yes
    recycle:repository = .recycle/%U
    recycle:keeptree = yes
    recycle:versions = yes
    recycle:touch = yes
    recycle:directory_mode = 0777
    recycle:subdir_mode = 0700
    vfs objects = zfsacl aio_pthread streams_xattr
    hide dot files = yes
    guest ok = no
    nfs4:mode = special
    nfs4:acedup = merge
    nfs4:chown = true
    zfsacl:acesort = dontcare


+--------------------------------------------------------------------------------+
+                                Kerberos Tickets                                +
+--------------------------------------------------------------------------------+
Credentials cache: FILE:/tmp/krb5cc_0
        Principal: Administrator@GSSLINC.LOCAL

  Issued           Expires        Principal
Jun 17 10:30:00  >>>Expired<<<  krbtgt/GSSLINC.LOCAL@GSSLINC.LOCAL


+--------------------------------------------------------------------------------+
+                         /usr/local/etc/sssd/sssd.conf                          +
+--------------------------------------------------------------------------------+


+--------------------------------------------------------------------------------+
+                  /etc/directoryservice/ActiveDirectory/config                  +
+--------------------------------------------------------------------------------+
ad_bindname=Administrator
ad_domainname=gsslinc.local
ad_netbiosname=GSSLINC
ad_basedn=DC=gsslinc,DC=local
ad_binddn=Administrator@GSSLINC.LOCAL
ad_site=
ad_dcname=srv-nsc.gsslinc.local
ad_dchost=srv-nsc.gsslinc.local
ad_dcport=389
ad_gcname=srv-nsc.gsslinc.local
ad_gchost=srv-nsc.gsslinc.local
ad_gcport=3268
ad_krbname=srv-shu.gsslinc.local:88
ad_krbhost=srv-shu.gsslinc.local
ad_krbport=88
ad_kpwdname=srv-shu.gsslinc.local:464
ad_kpwdhost=srv-shu.gsslinc.local
ad_kpwdport=464
ad_krb_realm=GSSLINC.LOCAL
ad_krb_kdc=srv-shu.gsslinc.local:88
ad_krb_admin_server=srv-shu.gsslinc.local:88
ad_krb_kpasswd_server=srv-shu.gsslinc.local:464
ad_keytab_name=
ad_keytab_principal=
ad_keytab_file=
ad_timeout=60
ad_dns_timeout=60
ad_certfile=
ad_ssl=off
ad_unix_extensions=0


+--------------------------------------------------------------------------------+
+                             adtool get config_file                             +
+--------------------------------------------------------------------------------+
ad_bindname=Administrator
ad_domainname=gsslinc.local
ad_netbiosname=GSSLINC
ad_basedn=DC=gsslinc,DC=local
ad_binddn=Administrator@GSSLINC.LOCAL
ad_site=
ad_dcname=srv-nsc.gsslinc.local
ad_dchost=srv-nsc.gsslinc.local
ad_dcport=389
ad_gcname=srv-nsc.gsslinc.local
ad_gchost=srv-nsc.gsslinc.local
ad_gcport=3268
ad_krbname=srv-shu.gsslinc.local:88
ad_krbhost=srv-shu.gsslinc.local
ad_krbport=88
ad_kpwdname=srv-shu.gsslinc.local:464
ad_kpwdhost=srv-shu.gsslinc.local
ad_kpwdport=464
ad_krb_realm=GSSLINC.LOCAL
ad_krb_kdc=srv-shu.gsslinc.local:88
ad_krb_admin_server=srv-shu.gsslinc.local:88
ad_krb_kpasswd_server=srv-shu.gsslinc.local:464
ad_keytab_name=
ad_keytab_principal=
ad_keytab_file=
ad_timeout=60
ad_dns_timeout=60
ad_certfile=
ad_ssl=off
ad_unix_extensions=0


+--------------------------------------------------------------------------------+
+                          Active Directory Domain Info                          +
+--------------------------------------------------------------------------------+
Environment LOGNAME is not defined. Trying anonymous access.
LDAP server: 192.168.17.4
LDAP server name: SRV-SHU.gsslinc.local
Realm: GSSLINC.LOCAL
Bind Path: dc=GSSLINC,dc=LOCAL
LDAP port: 389
Server time: Wed, 17 Jun 2015 13:53:02 PDT
KDC server: 192.168.17.4
Server time offset: 0


+--------------------------------------------------------------------------------+
+                         Active Directory Domain Status                         +
+--------------------------------------------------------------------------------+
Environment LOGNAME is not defined. Trying anonymous access.
Enter administrator's password:Enter administrator's password:

+--------------------------------------------------------------------------------+
+                         Active Directory Trust Secret                          +
+--------------------------------------------------------------------------------+
checking the trust secret for domain GSSLINC via RPC calls succeeded


+--------------------------------------------------------------------------------+
+                      Active Directory NETLOGON connection                      +
+--------------------------------------------------------------------------------+
checking the NETLOGON dc connection to "srv-nsc.gsslinc.local" succeeded


+--------------------------------------------------------------------------------+
+                        Active Directory trusted domains                        +
+--------------------------------------------------------------------------------+
BUILTIN
NAS01
GSSLINC


+--------------------------------------------------------------------------------+
+                          Active Directory all domains                          +
+--------------------------------------------------------------------------------+
BUILTIN
NAS01
GSSLINC


+--------------------------------------------------------------------------------+
+                          Active Directory own domain                           +
+--------------------------------------------------------------------------------+
GSSLINC




+--------------------------------------------------------------------------------+
+                         Active Directory online status                         +
+--------------------------------------------------------------------------------+
BUILTIN : online
NAS01 : online
GSSLINC : online


+--------------------------------------------------------------------------------+
+                          Active Directory domain info                          +
+--------------------------------------------------------------------------------+
Name              : GSSLINC
Alt_Name          : gsslinc.local
SID               : S-1-5-21-3080394745-490772642-1303209124
Active Directory  : Yes
Native            : Yes
Primary           : Yes


+--------------------------------------------------------------------------------+
+                            Active Directory DC name                            +
+--------------------------------------------------------------------------------+
SRV-SHU.gsslinc.local
\\SRV-SHU
2
ae248820-dd3e-48f7-8b3f-fb3ab6c4e384
gsslinc.local
gsslinc.local
0xe00011fd
Default-First-Site-Name
Default-First-Site-Name


+--------------------------------------------------------------------------------+
+                            Active Directory DC info                            +
+--------------------------------------------------------------------------------+
srv-nsc.gsslinc.local (192.168.17.3)


+--------------------------------------------------------------------------------+
+                       Active Directory Users and Groups                        +
+--------------------------------------------------------------------------------+
+--------------------------------------------------------------------------------+
+                                  Using wbinfo                                  +
+--------------------------------------------------------------------------------+
+--------------------------------------------------------------------------------+
+                                     Users                                      +
+--------------------------------------------------------------------------------+
NAS01\root
guest
iusr_dell-j7oqsa23ow
sqldebugger
administrator
administrator tmpl
krbtgt
billseymour
network admin
lkris
timl
iwam_dell-j7oqsa23ow
support_388945a0
iusr_srv-shu
mobile user tmpl
user tmpl
power user tmpl
billsey
flight ops 1
wertr
rogerc
ricardocorrea
peter
mluvara
lucasb
kcarter
craigb
camw
joep
ericb
vicr
shuser
briano
kevinc
russd
jdlewis
mattb
markw
regalf
kamit
scottc
amandac
scanner
sbs sts worker
webworkplacetools
standard user
efrische
barbarap
jackf
patrick
brady
caleb
erics
melissaw
kyleb
backup
leifs
sharonm
testuser
rogers
toddl
danj
phild
+--------------------------------------------------------------------------------+
+                                     Groups                                     +
+--------------------------------------------------------------------------------+
domain guests
sbs remote operators
domain users
exchange domain servers
denied rodc password replication group
schema admins
domain admins
enterprise admins
domain power users
enterprise read-only domain controllers
read-only domain controllers
group policy creator owners
domain controllers
domain computers
ras and ias servers
allowed rodc password replication group
cert publishers
stratos users
user roles
sbs p user templates
sbs admin templates
sbs fax operators
sbs folder operators
sbs mail operators
sbs sp admins
sbs mobile users
web workplace users
scwrite
scread
dnsupdateproxy
wsus reporters
wsus administrators
wins users
vs developers
telnetclients
sqlserver2005sqlbrowseruser$win-eugso7lo7py
sqlserver2005sqlbrowseruser$sbs-2008
sqlserver2005mssqluser$srv-shu$microsoft##ssee
sqlserver2005mssqluser$sbs-2008$sbsmonitoring
sqlserver2005mssqluser$sbs-2008$microsoft##ssee
sqlserver2005mssqlserveradhelperuser$win-eugso7lo7py
sqlserver2005mssqlserveradhelperuser$sbs-2008
sqlserver2005msfteuser$srv-shu$microsoft##ssee
sqlserver2005msfteuser$sbs-2008$sbsmonitoring
sqlserver2005msfteuser$sbs-2008$microsoft##ssee
ows_2905457056_admin
iis_wpg
helpservicesgroup
exchange enterprise servers
dnsadmins
dhcp users
dhcp administrators
debugger users
visualsvn server admins
sqlserver2005mssqluser$srv-nsc$microsoft##ssee
sqlserver2005msfteuser$srv-nsc$microsoft##ssee
wss_admin_wpg
wss_restricted_wpg
wss_wpg
winrmremotewmiusers__
nsc employees
+--------------------------------------------------------------------------------+
+                                  Using getent                                  +
+--------------------------------------------------------------------------------+
+--------------------------------------------------------------------------------+
+                                     Users                                      +
+--------------------------------------------------------------------------------+
root:$6$xbD3hNrqQrAUu444$oNQcqKIis5JpbR51r7nph6UxNhRKZ9ev5/cMAub614uHNLt7H/XDk0iFFr91pUGzSviXhsgYqjaTXl4dj7yo81:0:0:root:/root:/bin/csh
daemon:*:1:1:Owner of many system processes:/root:/usr/sbin/nologin
operator:*:2:5:System &:/:/usr/sbin/nologin
bin:*:3:7:Binaries Commands and Source:/:/usr/sbin/nologin
tty:*:4:65533:Tty Sandbox:/:/usr/sbin/nologin
kmem:*:5:2:KMem Sandbox:/:/usr/sbin/nologin
games:*:7:13:Games pseudo-user:/:/usr/sbin/nologin
news:*:8:8:News Subsystem:/:/usr/sbin/nologin
man:*:9:9:Mister Man Pages:/usr/share/man:/usr/sbin/nologin
sshd:*:22:22:Secure Shell Daemon:/var/empty:/usr/sbin/nologin
smmsp:*:25:25:Sendmail Submission User:/var/spool/clientmqueue:/usr/sbin/nologin
mailnull:*:26:26:Sendmail Default User:/var/spool/mqueue:/usr/sbin/nologin
bind:*:53:53:Bind Sandbox:/:/usr/sbin/nologin
proxy:*:62:62:Packet Filter pseudo-user:/nonexistent:/usr/sbin/nologin
_pflogd:*:64:64:pflogd privsep user:/var/empty:/usr/sbin/nologin
_dhcp:*:65:65:dhcp programs:/var/empty:/usr/sbin/nologin
uucp:*:66:66:UUCP pseudo-user:/var/spool/uucppublic:/usr/local/libexec/uucp/uucico
pop:*:68:6:Post Office Owner:/nonexistent:/usr/sbin/nologin
www:*:80:80:World Wide Web Owner:/nonexistent:/usr/sbin/nologin
nobody:*:65534:65534:Unprivileged user:/nonexistent:/usr/sbin/nologin
avahi:*:200:200:avahi user:/nonexistent:/usr/sbin/nologin
messagebus:*:201:201:messagebus user:/nonexistent:/usr/sbin/nologin
ftp:*:14:14::/nonexistent:/bin/csh
auditdistd:*:78:77:Auditdistd unprivileged user:/var/empty:/usr/sbin/nologin
hast:*:845:845:HAST unprivileged user:/var/empty:/usr/sbin/nologin
ladvd:*:79:78:ladvd user:/var/empty:/usr/sbin/nologin
webdav:*:666:666:WebDAV Anonymous User:/var/empty:/usr/sbin/nologin
nsc:$6$Fsbj46U01yWdql1y$r5yQR3EoOk8UAse4w89OuuIx8hwot0JEDmyDzEZ4QQM9QMp7c15luKYWbgfyyz5DUxOg2TM61SPVysklHhHxq0:1001:1001:Near Space Users:/nonexistent:/bin/csh
guest:*:20501:20514:Guest:/home/guest:/bin/sh
iusr_dell-j7oqsa23ow:*:21000:20513:IUSR_DELL-J7OQSA23OW:/home/iusr_dell-j7oqsa23ow:/bin/sh
sqldebugger:*:23615:20513:SQLDebugger:/home/sqldebugger:/bin/sh
administrator:*:20500:20513:Administrator:/home/administrator:/bin/sh
administrator tmpl:*:21127:20513:Administrator Template:/home/administrator tmpl:/bin/sh
krbtgt:*:20502:20513:krbtgt:/home/krbtgt:/bin/sh
billseymour:*:24645:20513:Bill Seymour:/home/billseymour:/bin/sh
network admin:*:24639:20513:Network Administrator:/home/network admin:/bin/sh
lkris:*:21139:20513:Kris Lachenmeier:/home/lkris:/bin/sh
timl:*:21138:20513:Tim Lachenmeier:/home/timl:/bin/sh
iwam_dell-j7oqsa23ow:*:21001:20513:IWAM_DELL-J7OQSA23OW:/home/iwam_dell-j7oqsa23ow:/bin/sh
support_388945a0:*:21004:20513:SUPPORT_388945a0:/home/support_388945a0:/bin/sh
iusr_srv-shu:*:22110:20513:IUSR_SRV-SHU:/home/iusr_srv-shu:/bin/sh
mobile user tmpl:*:21124:20513:Mobile User Template:/home/mobile user tmpl:/bin/sh
user tmpl:*:21125:20513:User Template:/home/user tmpl:/bin/sh
power user tmpl:*:21126:20513:Power User Template:/home/power user tmpl:/bin/sh
billsey:*:21151:20513:IT Support:/home/billsey:/bin/sh
flight ops 1:*:21192:20513:Flight Ops 1:/home/flight ops 1:/bin/sh
wertr:*:21206:20513:Wert Russert:/home/wertr:/bin/sh
rogerc:*:24124:20513:Roger Cox:/home/rogerc:/bin/sh
ricardocorrea:*:24123:20513:Ricardo Correa:/home/ricardocorrea:/bin/sh
peter:*:24127:20513:Peter Helman:/home/peter:/bin/sh
mluvara:*:24114:20513:Michael Luvara:/home/mluvara:/bin/sh
lucasb:*:24117:20513:Lucas Beveridge:/home/lucasb:/bin/sh
kcarter:*:24115:20513:Kelly Carter:/home/kcarter:/bin/sh
craigb:*:21201:20513:Craig Brunson:/home/craigb:/bin/sh
camw:*:24125:20513:Cameron Wilson:/home/camw:/bin/sh
joep:*:24116:20513:Joe Padberg:/home/joep:/bin/sh
ericb:*:24647:20513:Eric Byers:/home/ericb:/bin/sh
vicr:*:21205:20513:Vic Rogers:/home/vicr:/bin/sh
shuser:*:21197:20513:SHU Weather:/home/shuser:/bin/sh
briano:*:24130:20513:Brian Oglevie:/home/briano:/bin/sh
kevinc:*:21146:20513:Kevin Carlson:/home/kevinc:/bin/sh
russd:*:24651:20513:Russ Dewey:/home/russd:/bin/sh
jdlewis:*:23633:20513:JD Lewis:/home/jdlewis:/bin/sh
mattb:*:21145:20513:Matt Bingenheimer:/home/mattb:/bin/sh
markw:*:24654:20513:Mark Williamson:/home/markw:/bin/sh
regalf:*:24655:20513:Regal Ferrulli:/home/regalf:/bin/sh
kamit:*:21149:20513:Kami Tomlinson:/home/kamit:/bin/sh
scottc:*:24657:20513:Scott Couturier:/home/scottc:/bin/sh
amandac:*:36111:20513:Amanda Cairns:/home/amandac:/bin/sh
scanner:*:24119:20513:Scanner:/home/scanner:/bin/sh
sbs sts worker:*:21129:21119:STS Worker:/home/sbs sts worker:/bin/sh
webworkplacetools:*:24640:20513:Standard User with administration links:/home/webworkplacetools:/bin/sh
standard user:*:25610:20513:Standard User:/home/standard user:/bin/sh
efrische:*:36110:20513:Eric Frische:/home/efrische:/bin/sh
barbarap:*:23635:20513:Barbara Pruijn:/home/barbarap:/bin/sh
jackf:*:36614:20513:Jack Fox:/home/jackf:/bin/sh
patrick:*:36615:20513:Patrick Wright:/home/patrick:/bin/sh
brady:*:36616:20513:Brady Rhodes:/home/brady:/bin/sh
caleb:*:36617:20513:Caleb Oldenkamp:/home/caleb:/bin/sh
erics:*:36619:20513:Eric Simpkins:/home/erics:/bin/sh
melissaw:*:36620:20513:Melissa Warner:/home/melissaw:/bin/sh
kyleb:*:23645:20513:Kyle Bisson:/home/kyleb:/bin/sh
backup:*:23646:20513:Backup:/home/backup:/bin/sh
leifs:*:36624:20513:Leif Swanson:/home/leifs:/bin/sh
sharonm:*:23648:20513:Sharon Matney:/home/sharonm:/bin/sh
testuser:*:36625:20513:Test User:/home/testuser:/bin/sh
rogers:*:36626:20513:Roger Shipman:/home/rogers:/bin/sh
toddl:*:36630:20513:Todd Lester:/home/toddl:/bin/sh
danj:*:36631:20513:Dan Jensen:/home/danj:/bin/sh
phild:*:23653:20513:Phil Delurgio:/home/phild:/bin/sh
+--------------------------------------------------------------------------------+
+                                     Groups                                     +
+--------------------------------------------------------------------------------+
wheel:*:0:nsc
daemon:*:1:nsc
kmem:*:2:nsc
sys:*:3:nsc
tty:*:4:nsc
operator:*:5:uucp,nsc
mail:*:6:nsc
bin:*:7:nsc
news:*:8:nsc
man:*:9:nsc
games:*:13:nsc
ftp:*:14:nsc
staff:*:20:nsc
sshd:*:22:nsc
smmsp:*:25:nsc
mailnull:*:26:nsc
guest:*:31:nsc
bind:*:53:nsc
proxy:*:62:nsc
authpf:*:63:nsc
_pflogd:*:64:nsc
_dhcp:*:65:nsc
uucp:*:66:nsc
dialer:*:68:nsc
network:*:69:nsc
audit:*:77:nsc
www:*:80:nsc
nogroup:*:65533:nsc
nobody:*:65534:nsc
avahi:*:200:nsc
messagebus:*:201:nsc
hast:*:845:nsc
ladvd:*:78:nsc
webdav:*:666:nsc
nsc:*:1001
domain guests:x:20514
sbs remote operators:x:21118
domain users:x:20513
exchange domain servers:x:21130
denied rodc password replication group:x:20572:krbtgt
schema admins:x:20518:network admin,billseymour,lkris,administrator
domain admins:x:20512:network admin,billseymour,administrator tmpl,timl,lkris,administrator
enterprise admins:x:20519:network admin,billseymour,lkris,administrator
domain power users:x:21120:power user tmpl
enterprise read-only domain controllers:x:20498
read-only domain controllers:x:20521
group policy creator owners:x:20520:administrator
domain controllers:x:20516
domain computers:x:20515
ras and ias servers:x:20553
allowed rodc password replication group:x:20571
cert publishers:x:20517
stratos users:x:24122
user roles:x:24637:network admin,webworkplacetools,standard user
sbs p user templates:x:21113:mobile user tmpl,user tmpl
sbs admin templates:x:21114:mobile user tmpl,user tmpl,power user tmpl,administrator tmpl
sbs fax operators:x:21115
sbs folder operators:x:21116
sbs mail operators:x:21117
sbs sp admins:x:21119:administrator
sbs mobile users:x:21122:mobile user tmpl,power user tmpl,administrator tmpl,administrator
web workplace users:x:21123:mobile user tmpl,user tmpl,power user tmpl,administrator tmpl
scwrite:x:21213
scread:x:21212
dnsupdateproxy:x:21111
wsus reporters:x:24617
wsus administrators:x:24616
wins users:x:21006
vs developers:x:23614
telnetclients:x:21005
sqlserver2005sqlbrowseruser$win-eugso7lo7py:x:24643
sqlserver2005sqlbrowseruser$sbs-2008:x:24615
sqlserver2005mssqluser$srv-shu$microsoft##ssee:x:22111
sqlserver2005mssqluser$sbs-2008$sbsmonitoring:x:24614
sqlserver2005mssqluser$sbs-2008$microsoft##ssee:x:24613
sqlserver2005mssqlserveradhelperuser$win-eugso7lo7py:x:24644
sqlserver2005mssqlserveradhelperuser$sbs-2008:x:24612
sqlserver2005msfteuser$srv-shu$microsoft##ssee:x:22112
sqlserver2005msfteuser$sbs-2008$sbsmonitoring:x:24611
sqlserver2005msfteuser$sbs-2008$microsoft##ssee:x:24610
ows_2905457056_admin:x:21112
iis_wpg:x:21002:iwam_dell-j7oqsa23ow
helpservicesgroup:x:21003:support_388945a0
exchange enterprise servers:x:21131
dnsadmins:x:21110
dhcp users:x:21007
dhcp administrators:x:21008
debugger users:x:23613:rogers,administrator
visualsvn server admins:x:23622
sqlserver2005mssqluser$srv-nsc$microsoft##ssee:x:36610
sqlserver2005msfteuser$srv-nsc$microsoft##ssee:x:36611
wss_admin_wpg:x:23637
wss_restricted_wpg:x:23638
wss_wpg:x:23639
winrmremotewmiusers__:x:36613
nsc employees:x:23649:briano,billseymour,russd,kyleb,sharonm,timl,lkris,mattb,kevinc,kamit,jackf,brady,caleb,efrische,leifs


+--------------------------------------------------------------------------------+
+                           User and Group cache dump                            +
+--------------------------------------------------------------------------------+
FreeNAS_Users:
     pwd.struct_passwd(pw_name='bin', pw_passwd='*', pw_uid=3, pw_gid=7, pw_gecos='Binaries Commands and Source', pw_dir='/', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='tty', pw_passwd='*', pw_uid=4, pw_gid=65533, pw_gecos='Tty Sandbox', pw_dir='/', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='webdav', pw_passwd='*', pw_uid=666, pw_gid=666, pw_gecos='WebDAV Anonymous User', pw_dir='/var/empty', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='_dhcp', pw_passwd='*', pw_uid=65, pw_gid=65, pw_gecos='dhcp programs', pw_dir='/var/empty', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='www', pw_passwd='*', pw_uid=80, pw_gid=80, pw_gecos='World Wide Web Owner', pw_dir='/nonexistent', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='pop', pw_passwd='*', pw_uid=68, pw_gid=6, pw_gecos='Post Office Owner', pw_dir='/nonexistent', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='smmsp', pw_passwd='*', pw_uid=25, pw_gid=25, pw_gecos='Sendmail Submission User', pw_dir='/var/spool/clientmqueue', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='operator', pw_passwd='*', pw_uid=2, pw_gid=5, pw_gecos='System &', pw_dir='/', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='ftp', pw_passwd='*', pw_uid=14, pw_gid=14, pw_gecos='', pw_dir='/nonexistent', pw_shell='/bin/csh')
     pwd.struct_passwd(pw_name='uucp', pw_passwd='*', pw_uid=66, pw_gid=66, pw_gecos='UUCP pseudo-user', pw_dir='/var/spool/uucppublic', pw_shell='/usr/local/libexec/uucp/uucico')
     pwd.struct_passwd(pw_name='ladvd', pw_passwd='*', pw_uid=79, pw_gid=78, pw_gecos='ladvd user', pw_dir='/var/empty', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='mailnull', pw_passwd='*', pw_uid=26, pw_gid=26, pw_gecos='Sendmail Default User', pw_dir='/var/spool/mqueue', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='_pflogd', pw_passwd='*', pw_uid=64, pw_gid=64, pw_gecos='pflogd privsep user', pw_dir='/var/empty', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='nsc', pw_passwd='$6$Fsbj46U01yWdql1y$r5yQR3EoOk8UAse4w89OuuIx8hwot0JEDmyDzEZ4QQM9QMp7c15luKYWbgfyyz5DUxOg2TM61SPVysklHhHxq0', pw_uid=1001, pw_gid=1001, pw_gecos='Near Space Users', pw_dir='/nonexistent', pw_shell='/bin/csh')
     pwd.struct_passwd(pw_name='messagebus', pw_passwd='*', pw_uid=201, pw_gid=201, pw_gecos='messagebus user', pw_dir='/nonexistent', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='kmem', pw_passwd='*', pw_uid=5, pw_gid=2, pw_gecos='KMem Sandbox', pw_dir='/', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='nobody', pw_passwd='*', pw_uid=65534, pw_gid=65534, pw_gecos='Unprivileged user', pw_dir='/nonexistent', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='sshd', pw_passwd='*', pw_uid=22, pw_gid=22, pw_gecos='Secure Shell Daemon', pw_dir='/var/empty', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='proxy', pw_passwd='*', pw_uid=62, pw_gid=62, pw_gecos='Packet Filter pseudo-user', pw_dir='/nonexistent', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='hast', pw_passwd='*', pw_uid=845, pw_gid=845, pw_gecos='HAST unprivileged user', pw_dir='/var/empty', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='news', pw_passwd='*', pw_uid=8, pw_gid=8, pw_gecos='News Subsystem', pw_dir='/', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='man', pw_passwd='*', pw_uid=9, pw_gid=9, pw_gecos='Mister Man Pages', pw_dir='/usr/share/man', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='daemon', pw_passwd='*', pw_uid=1, pw_gid=1, pw_gecos='Owner of many system processes', pw_dir='/root', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='bind', pw_passwd='*', pw_uid=53, pw_gid=53, pw_gecos='Bind Sandbox', pw_dir='/', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='auditdistd', pw_passwd='*', pw_uid=78, pw_gid=77, pw_gecos='Auditdistd unprivileged user', pw_dir='/var/empty', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='games', pw_passwd='*', pw_uid=7, pw_gid=13, pw_gecos='Games pseudo-user', pw_dir='/', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='avahi', pw_passwd='*', pw_uid=200, pw_gid=200, pw_gecos='avahi user', pw_dir='/nonexistent', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='root', pw_passwd='$6$xbD3hNrqQrAUu444$oNQcqKIis5JpbR51r7nph6UxNhRKZ9ev5/cMAub614uHNLt7H/XDk0iFFr91pUGzSviXhsgYqjaTXl4dj7yo81', pw_uid=0, pw_gid=0, pw_gecos='root', pw_dir='/root', pw_shell='/bin/csh')
     pwd.struct_passwd(pw_name='administrator', pw_passwd='*', pw_uid=20500, pw_gid=20513, pw_gecos='', pw_dir='/home/administrator', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='administrator tmpl', pw_passwd='*', pw_uid=21127, pw_gid=20513, pw_gecos='Administrator Template', pw_dir='/home/administrator tmpl', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='billseymour', pw_passwd='*', pw_uid=24645, pw_gid=20513, pw_gecos='Bill Seymour', pw_dir='/home/billseymour', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='billsey', pw_passwd='*', pw_uid=21151, pw_gid=20513, pw_gecos='IT Support', pw_dir='/home/billsey', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='briano', pw_passwd='*', pw_uid=24130, pw_gid=20513, pw_gecos='Brian Oglevie', pw_dir='/home/briano', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='camw', pw_passwd='*', pw_uid=24125, pw_gid=20513, pw_gecos='Cameron Wilson', pw_dir='/home/camw', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='craigb', pw_passwd='*', pw_uid=21201, pw_gid=20513, pw_gecos='Craig Brunson', pw_dir='/home/craigb', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='danj', pw_passwd='*', pw_uid=36631, pw_gid=20513, pw_gecos='', pw_dir='/home/danj', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='ericb', pw_passwd='*', pw_uid=24647, pw_gid=20513, pw_gecos='Eric Byers', pw_dir='/home/ericb', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='flight ops 1', pw_passwd='*', pw_uid=21192, pw_gid=20513, pw_gecos='Flight Ops 1', pw_dir='/home/flight ops 1', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='guest', pw_passwd='*', pw_uid=20501, pw_gid=20514, pw_gecos='Guest', pw_dir='/home/guest', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='iusr_dell-j7oqsa23ow', pw_passwd='*', pw_uid=21000, pw_gid=20513, pw_gecos='IUSR_DELL-J7OQSA23OW', pw_dir='/home/iusr_dell-j7oqsa23ow', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='iusr_srv-shu', pw_passwd='*', pw_uid=22110, pw_gid=20513, pw_gecos='IUSR_SRV-SHU', pw_dir='/home/iusr_srv-shu', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='iwam_dell-j7oqsa23ow', pw_passwd='*', pw_uid=21001, pw_gid=20513, pw_gecos='IWAM_DELL-J7OQSA23OW', pw_dir='/home/iwam_dell-j7oqsa23ow', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='jackf', pw_passwd='*', pw_uid=36614, pw_gid=20513, pw_gecos='Jack Fox', pw_dir='/home/jackf', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='joep', pw_passwd='*', pw_uid=24116, pw_gid=20513, pw_gecos='Joe Padberg', pw_dir='/home/joep', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='kamit', pw_passwd='*', pw_uid=21149, pw_gid=20513, pw_gecos='', pw_dir='/home/kamit', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='kevinc', pw_passwd='*', pw_uid=21146, pw_gid=20513, pw_gecos='', pw_dir='/home/kevinc', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='lucasb', pw_passwd='*', pw_uid=24117, pw_gid=20513, pw_gecos='Lucas Beveridge', pw_dir='/home/lucasb', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='markw', pw_passwd='*', pw_uid=24654, pw_gid=20513, pw_gecos='Mark Williamson', pw_dir='/home/markw', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='mattb', pw_passwd='*', pw_uid=21145, pw_gid=20513, pw_gecos='', pw_dir='/home/mattb', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='mobile user tmpl', pw_passwd='*', pw_uid=21124, pw_gid=20513, pw_gecos='Mobile User Template', pw_dir='/home/mobile user tmpl', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='network admin', pw_passwd='*', pw_uid=24639, pw_gid=20513, pw_gecos='Network Administrator', pw_dir='/home/network admin', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='peter', pw_passwd='*', pw_uid=24127, pw_gid=20513, pw_gecos='Peter Helman', pw_dir='/home/peter', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='power user tmpl', pw_passwd='*', pw_uid=21126, pw_gid=20513, pw_gecos='Power User Template', pw_dir='/home/power user tmpl', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='regalf', pw_passwd='*', pw_uid=24655, pw_gid=20513, pw_gecos='Regal Ferrulli', pw_dir='/home/regalf', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='ricardocorrea', pw_passwd='*', pw_uid=24123, pw_gid=20513, pw_gecos='Ricardo Correa', pw_dir='/home/ricardocorrea', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='rogerc', pw_passwd='*', pw_uid=24124, pw_gid=20513, pw_gecos='Roger Cox', pw_dir='/home/rogerc', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='russd', pw_passwd='*', pw_uid=24651, pw_gid=20513, pw_gecos='', pw_dir='/home/russd', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='sbs sts worker', pw_passwd='*', pw_uid=21129, pw_gid=21119, pw_gecos='STS Worker', pw_dir='/home/sbs sts worker', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='shuser', pw_passwd='*', pw_uid=21197, pw_gid=20513, pw_gecos='', pw_dir='/home/shuser', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='sqldebugger', pw_passwd='*', pw_uid=23615, pw_gid=20513, pw_gecos='SQLDebugger', pw_dir='/home/sqldebugger', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='support_388945a0', pw_passwd='*', pw_uid=21004, pw_gid=20513, pw_gecos='SUPPORT_388945a0', pw_dir='/home/support_388945a0', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='scanner', pw_passwd='*', pw_uid=24119, pw_gid=20513, pw_gecos='Scanner', pw_dir='/home/scanner', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='scottc', pw_passwd='*', pw_uid=24657, pw_gid=20513, pw_gecos='Scott Couturier', pw_dir='/home/scottc', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='standard user', pw_passwd='*', pw_uid=25610, pw_gid=20513, pw_gecos='Standard User', pw_dir='/home/standard user', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='timl', pw_passwd='*', pw_uid=21138, pw_gid=20513, pw_gecos='', pw_dir='/home/timl', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='toddl', pw_passwd='*', pw_uid=36630, pw_gid=20513, pw_gecos='', pw_dir='/home/toddl', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='user tmpl', pw_passwd='*', pw_uid=21125, pw_gid=20513, pw_gecos='User Template', pw_dir='/home/user tmpl', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='vicr', pw_passwd='*', pw_uid=21205, pw_gid=20513, pw_gecos='Vic Rogers', pw_dir='/home/vicr', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='webworkplacetools', pw_passwd='*', pw_uid=24640, pw_gid=20513, pw_gecos='Standard User with administration links', pw_dir='/home/webworkplacetools', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='wertr', pw_passwd='*', pw_uid=21206, pw_gid=20513, pw_gecos='Wert Russert', pw_dir='/home/wertr', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='amandac', pw_passwd='*', pw_uid=36111, pw_gid=20513, pw_gecos='Amanda Cairns', pw_dir='/home/amandac', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='backup', pw_passwd='*', pw_uid=23646, pw_gid=20513, pw_gecos='Backup', pw_dir='/home/backup', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='barbarap', pw_passwd='*', pw_uid=23635, pw_gid=20513, pw_gecos='Barbara Pruijn', pw_dir='/home/barbarap', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='brady', pw_passwd='*', pw_uid=36616, pw_gid=20513, pw_gecos='', pw_dir='/home/brady', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='caleb', pw_passwd='*', pw_uid=36617, pw_gid=20513, pw_gecos='Caleb Oldenkamp', pw_dir='/home/caleb', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='efrische', pw_passwd='*', pw_uid=36110, pw_gid=20513, pw_gecos='Eric Frische', pw_dir='/home/efrische', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='erics', pw_passwd='*', pw_uid=36619, pw_gid=20513, pw_gecos='Eric Simpkins', pw_dir='/home/erics', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='jdlewis', pw_passwd='*', pw_uid=23633, pw_gid=20513, pw_gecos='JD Lewis', pw_dir='/home/jdlewis', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='kcarter', pw_passwd='*', pw_uid=24115, pw_gid=20513, pw_gecos='Kelly Carter', pw_dir='/home/kcarter', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='krbtgt', pw_passwd='*', pw_uid=20502, pw_gid=20513, pw_gecos='krbtgt', pw_dir='/home/krbtgt', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='kyleb', pw_passwd='*', pw_uid=23645, pw_gid=20513, pw_gecos='Kyle Bisson', pw_dir='/home/kyleb', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='leifs', pw_passwd='*', pw_uid=36624, pw_gid=20513, pw_gecos='', pw_dir='/home/leifs', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='lkris', pw_passwd='*', pw_uid=21139, pw_gid=20513, pw_gecos='Kris Lachenmeier', pw_dir='/home/lkris', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='melissaw', pw_passwd='*', pw_uid=36620, pw_gid=20513, pw_gecos='Melissa Warner', pw_dir='/home/melissaw', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='mluvara', pw_passwd='*', pw_uid=24114, pw_gid=20513, pw_gecos='Michael Luvara', pw_dir='/home/mluvara', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='patrick', pw_passwd='*', pw_uid=36615, pw_gid=20513, pw_gecos='Patrick Wright', pw_dir='/home/patrick', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='rogers', pw_passwd='*', pw_uid=36626, pw_gid=20513, pw_gecos='Roger Shipman', pw_dir='/home/rogers', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='sharonm', pw_passwd='*', pw_uid=23648, pw_gid=20513, pw_gecos='Sharon Matney', pw_dir='/home/sharonm', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='testuser', pw_passwd='*', pw_uid=36625, pw_gid=20513, pw_gecos='Test User', pw_dir='/home/testuser', pw_shell='/bin/sh')



FreeNAS_Groups:
     grp.struct_group(gr_name='bin', gr_passwd='*', gr_gid=7, gr_mem=['nsc'])
     grp.struct_group(gr_name='tty', gr_passwd='*', gr_gid=4, gr_mem=['nsc'])
     grp.struct_group(gr_name='webdav', gr_passwd='*', gr_gid=666, gr_mem=['nsc'])
     grp.struct_group(gr_name='_dhcp', gr_passwd='*', gr_gid=65, gr_mem=['nsc'])
     grp.struct_group(gr_name='www', gr_passwd='*', gr_gid=80, gr_mem=['nsc'])
     grp.struct_group(gr_name='smmsp', gr_passwd='*', gr_gid=25, gr_mem=['nsc'])
     grp.struct_group(gr_name='operator', gr_passwd='*', gr_gid=5, gr_mem=['uucp', 'nsc'])
     grp.struct_group(gr_name='staff', gr_passwd='*', gr_gid=20, gr_mem=['nsc'])
     grp.struct_group(gr_name='ftp', gr_passwd='*', gr_gid=14, gr_mem=['nsc'])
     grp.struct_group(gr_name='uucp', gr_passwd='*', gr_gid=66, gr_mem=['nsc'])
     grp.struct_group(gr_name='ladvd', gr_passwd='*', gr_gid=78, gr_mem=['nsc'])
     grp.struct_group(gr_name='guest', gr_passwd='*', gr_gid=31, gr_mem=['nsc'])
     grp.struct_group(gr_name='mailnull', gr_passwd='*', gr_gid=26, gr_mem=['nsc'])
     grp.struct_group(gr_name='wheel', gr_passwd='*', gr_gid=0, gr_mem=['nsc'])
     grp.struct_group(gr_name='mail', gr_passwd='*', gr_gid=6, gr_mem=['nsc'])
     grp.struct_group(gr_name='man', gr_passwd='*', gr_gid=9, gr_mem=['nsc'])
     grp.struct_group(gr_name='_pflogd', gr_passwd='*', gr_gid=64, gr_mem=['nsc'])
     grp.struct_group(gr_name='nsc', gr_passwd='*', gr_gid=1001, gr_mem=[])
     grp.struct_group(gr_name='messagebus', gr_passwd='*', gr_gid=201, gr_mem=['nsc'])
     grp.struct_group(gr_name='kmem', gr_passwd='*', gr_gid=2, gr_mem=['nsc'])
     grp.struct_group(gr_name='nobody', gr_passwd='*', gr_gid=65534, gr_mem=['nsc'])
     grp.struct_group(gr_name='sshd', gr_passwd='*', gr_gid=22, gr_mem=['nsc'])
     grp.struct_group(gr_name='sys', gr_passwd='*', gr_gid=3, gr_mem=['nsc'])
     grp.struct_group(gr_name='proxy', gr_passwd='*', gr_gid=62, gr_mem=['nsc'])
     grp.struct_group(gr_name='hast', gr_passwd='*', gr_gid=845, gr_mem=['nsc'])
     grp.struct_group(gr_name='news', gr_passwd='*', gr_gid=8, gr_mem=['nsc'])
     grp.struct_group(gr_name='network', gr_passwd='*', gr_gid=69, gr_mem=['nsc'])
     grp.struct_group(gr_name='audit', gr_passwd='*', gr_gid=77, gr_mem=['nsc'])
     grp.struct_group(gr_name='daemon', gr_passwd='*', gr_gid=1, gr_mem=['nsc'])
     grp.struct_group(gr_name='nogroup', gr_passwd='*', gr_gid=65533, gr_mem=['nsc'])
     grp.struct_group(gr_name='bind', gr_passwd='*', gr_gid=53, gr_mem=['nsc'])
     grp.struct_group(gr_name='authpf', gr_passwd='*', gr_gid=63, gr_mem=['nsc'])
     grp.struct_group(gr_name='dialer', gr_passwd='*', gr_gid=68, gr_mem=['nsc'])
     grp.struct_group(gr_name='games', gr_passwd='*', gr_gid=13, gr_mem=['nsc'])
     grp.struct_group(gr_name='avahi', gr_passwd='*', gr_gid=200, gr_mem=['nsc'])
     grp.struct_group(gr_name='sbs admin templates', gr_passwd='x', gr_gid=21114, gr_mem=['mobile user tmpl', 'user tmpl', 'power user tmpl', 'administrator tmpl'])
     grp.struct_group(gr_name='all users', gr_passwd='x', gr_gid=24630, gr_mem=['joep', 'briano', 'billseymour', 'ericb', 'russd', 'markw', 'regalf', 'scottc', 'sbs sts worker', 'timl', 'lkris', 'mattb', 'kevinc', 'kamit', 'vicr'])
     grp.struct_group(gr_name='allowed rodc password replication group', gr_passwd='x', gr_gid=20571, gr_mem=[])
     grp.struct_group(gr_name='cert publishers', gr_passwd='x', gr_gid=20517, gr_mem=[])
     grp.struct_group(gr_name='dhcp administrators', gr_passwd='x', gr_gid=21008, gr_mem=[])
     grp.struct_group(gr_name='dhcp users', gr_passwd='x', gr_gid=21007, gr_mem=[])
     grp.struct_group(gr_name='debugger users', gr_passwd='x', gr_gid=23613, gr_mem=['rogers', 'administrator'])
     grp.struct_group(gr_name='denied rodc password replication group', gr_passwd='x', gr_gid=20572, gr_mem=['krbtgt'])
     grp.struct_group(gr_name='dnsadmins', gr_passwd='x', gr_gid=21110, gr_mem=[])
     grp.struct_group(gr_name='dnsupdateproxy', gr_passwd='x', gr_gid=21111, gr_mem=[])
     grp.struct_group(gr_name='domain admins', gr_passwd='x', gr_gid=20512, gr_mem=['network admin', 'billseymour', 'administrator tmpl', 'timl', 'lkris', 'administrator'])
     grp.struct_group(gr_name='domain computers', gr_passwd='x', gr_gid=20515, gr_mem=[])
     grp.struct_group(gr_name='domain controllers', gr_passwd='x', gr_gid=20516, gr_mem=[])
     grp.struct_group(gr_name='domain guests', gr_passwd='x', gr_gid=20514, gr_mem=[])
     grp.struct_group(gr_name='domain power users', gr_passwd='x', gr_gid=21120, gr_mem=['power user tmpl'])
     grp.struct_group(gr_name='domain users', gr_passwd='x', gr_gid=20513, gr_mem=[])
     grp.struct_group(gr_name='enterprise admins', gr_passwd='x', gr_gid=20519, gr_mem=['network admin', 'billseymour', 'lkris', 'administrator'])
     grp.struct_group(gr_name='enterprise read-only domain controllers', gr_passwd='x', gr_gid=20498, gr_mem=[])
     grp.struct_group(gr_name='exchange domain servers', gr_passwd='x', gr_gid=21130, gr_mem=[])
     grp.struct_group(gr_name='exchange enterprise servers', gr_passwd='x', gr_gid=21131, gr_mem=[])
     grp.struct_group(gr_name='sbs fax operators', gr_passwd='x', gr_gid=21115, gr_mem=[])
     grp.struct_group(gr_name='fsrmreports', gr_passwd='x', gr_gid=24642, gr_mem=[])
     grp.struct_group(gr_name='sbs folder operators', gr_passwd='x', gr_gid=21116, gr_mem=[])
     grp.struct_group(gr_name='gsslinc', gr_passwd='x', gr_gid=21135, gr_mem=['mobile user tmpl', 'user tmpl', 'power user tmpl', 'administrator tmpl'])
     grp.struct_group(gr_name='group policy creator owners', gr_passwd='x', gr_gid=20520, gr_mem=['administrator'])
     grp.struct_group(gr_name='helpservicesgroup', gr_passwd='x', gr_gid=21003, gr_mem=['support_388945a0'])
     grp.struct_group(gr_name='iis_wpg', gr_passwd='x', gr_gid=21002, gr_mem=['iwam_dell-j7oqsa23ow'])
     grp.struct_group(gr_name='sbs mail operators', gr_passwd='x', gr_gid=21117, gr_mem=[])
     grp.struct_group(gr_name='sbs mobile users', gr_passwd='x', gr_gid=21122, gr_mem=['mobile user tmpl', 'power user tmpl', 'administrator tmpl', 'administrator'])
     grp.struct_group(gr_name='nsc employees', gr_passwd='x', gr_gid=23649, gr_mem=['briano', 'billseymour', 'russd', 'kyleb', 'sharonm', 'timl', 'lkris', 'mattb', 'kevinc', 'kamit', 'jackf', 'brady', 'caleb', 'efrische', 'leifs'])
     grp.struct_group(gr_name='ows_2905457056_admin', gr_passwd='x', gr_gid=21112, gr_mem=[])
     grp.struct_group(gr_name='postmaster', gr_passwd='x', gr_gid=24641, gr_mem=[])
     grp.struct_group(gr_name='sbs p user templates', gr_passwd='x', gr_gid=21113, gr_mem=['mobile user tmpl', 'user tmpl'])
     grp.struct_group(gr_name='ras and ias servers', gr_passwd='x', gr_gid=20553, gr_mem=[])
     grp.struct_group(gr_name='read-only domain controllers', gr_passwd='x', gr_gid=20521, gr_mem=[])
     grp.struct_group(gr_name='sbs remote operators', gr_passwd='x', gr_gid=21118, gr_mem=[])
     grp.struct_group(gr_name='web workplace users', gr_passwd='x', gr_gid=21123, gr_mem=['mobile user tmpl', 'user tmpl', 'power user tmpl', 'administrator tmpl'])
     grp.struct_group(gr_name='scread', gr_passwd='x', gr_gid=21212, gr_mem=[])
     grp.struct_group(gr_name='scwrite', gr_passwd='x', gr_gid=21213, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005msfteuser$sbs-2008$microsoft##ssee', gr_passwd='x', gr_gid=24610, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005msfteuser$sbs-2008$sbsmonitoring', gr_passwd='x', gr_gid=24611, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005msfteuser$srv-nsc$microsoft##ssee', gr_passwd='x', gr_gid=36611, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005msfteuser$srv-shu$microsoft##ssee', gr_passwd='x', gr_gid=22112, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005mssqlserveradhelperuser$sbs-2008', gr_passwd='x', gr_gid=24612, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005mssqlserveradhelperuser$win-eugso7lo7py', gr_passwd='x', gr_gid=24644, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005mssqluser$sbs-2008$microsoft##ssee', gr_passwd='x', gr_gid=24613, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005mssqluser$sbs-2008$sbsmonitoring', gr_passwd='x', gr_gid=24614, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005mssqluser$srv-nsc$microsoft##ssee', gr_passwd='x', gr_gid=36610, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005mssqluser$srv-shu$microsoft##ssee', gr_passwd='x', gr_gid=22111, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005sqlbrowseruser$sbs-2008', gr_passwd='x', gr_gid=24615, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005sqlbrowseruser$win-eugso7lo7py', gr_passwd='x', gr_gid=24643, gr_mem=[])
     grp.struct_group(gr_name='stratos users', gr_passwd='x', gr_gid=24122, gr_mem=[])
     grp.struct_group(gr_name='schema admins', gr_passwd='x', gr_gid=20518, gr_mem=['network admin', 'billseymour', 'lkris', 'administrator'])
     grp.struct_group(gr_name='sbs sp admins', gr_passwd='x', gr_gid=21119, gr_mem=['administrator'])
     grp.struct_group(gr_name='telnetclients', gr_passwd='x', gr_gid=21005, gr_mem=[])
     grp.struct_group(gr_name='user roles', gr_passwd='x', gr_gid=24637, gr_mem=['network admin', 'webworkplacetools', 'standard user'])
     grp.struct_group(gr_name='vs developers', gr_passwd='x', gr_gid=23614, gr_mem=[])
     grp.struct_group(gr_name='visualsvn server admins', gr_passwd='x', gr_gid=23622, gr_mem=[])
     grp.struct_group(gr_name='wins users', gr_passwd='x', gr_gid=21006, gr_mem=[])
     grp.struct_group(gr_name='wss_admin_wpg', gr_passwd='x', gr_gid=23637, gr_mem=[])
     grp.struct_group(gr_name='wss_restricted_wpg', gr_passwd='x', gr_gid=23638, gr_mem=[])
     grp.struct_group(gr_name='wss_wpg', gr_passwd='x', gr_gid=23639, gr_mem=[])
     grp.struct_group(gr_name='wsus administrators', gr_passwd='x', gr_gid=24616, gr_mem=[])
     grp.struct_group(gr_name='wsus reporters', gr_passwd='x', gr_gid=24617, gr_mem=[])
     grp.struct_group(gr_name='winrmremotewmiusers__', gr_passwd='x', gr_gid=36613, gr_mem=[])


