+--------------------------------------------------------------------------------+
+                                  LDAP Status                                   +
+--------------------------------------------------------------------------------+
LDAP is DISABLED


+--------------------------------------------------------------------------------+
+                                 LDAP Settings                                  +
+--------------------------------------------------------------------------------+
Hostname:               
Base DN:                
Bind DN:                
Anonymous Bind:         0
User Suffix:            
Group Suffix:           
Password Suffix:        
Machine Suffix:         
SUDO Suffix:            
Use Default Domain:     off
SSL:                    False
Samba Schema:           


+--------------------------------------------------------------------------------+
+                               /etc/nsswitch.conf                               +
+--------------------------------------------------------------------------------+
services: files
rpc: files
group: files winbind
shells: files
passwd: files winbind
hosts: files mdns dns
sudoers: files
networks: files
protocols: files


+--------------------------------------------------------------------------------+
+                                 /etc/krb5.conf                                 +
+--------------------------------------------------------------------------------+
[appdefaults]
            pam = {
                forwardable = true
                ticket_lifetime = 86400
                renew_lifetime = 86400
            }

[libdefaults]
            dns_lookup_realm = true
            dns_lookup_kdc = true
            ticket_lifetime = 24h
            clockskew = 300
            forwardable = yes

[domain_realm]
            gsslinc.local = GSSLINC.LOCAL
            .gsslinc.local = GSSLINC.LOCAL
            GSSLINC.LOCAL = GSSLINC.LOCAL
            .GSSLINC.LOCAL = GSSLINC.LOCAL

[realms]
        GSSLINC.LOCAL = {
            kdc = srv-shu.gsslinc.local:88
            admin_server = srv-shu.gsslinc.local:88
            kpasswd_server = srv-shu.gsslinc.local:464
            default_domain = GSSLINC.LOCAL
        }

[logging]
            default = SYSLOG:INFO:LOCAL7



+--------------------------------------------------------------------------------+
+                            /usr/local/etc/smb4.conf                            +
+--------------------------------------------------------------------------------+
[global]
    server max protocol = SMB3
    interfaces = 127.0.0.1 192.168.17.5 192.168.17.70
    bind interfaces only = yes
    encrypt passwords = yes
    dns proxy = no
    strict locking = no
    oplocks = yes
    deadtime = 15
    max log size = 51200
    max open files = 588908
    load printers = no
    printing = bsd
    printcap name = /dev/null
    disable spoolss = yes
    getwd cache = yes
    guest account = nobody
    map to guest = Bad User
    obey pam restrictions = yes
    directory name cache size = 0
    kernel change notify = no
    dfree command = /usr/local/libexec/samba/dfree
    panic action = /usr/local/libexec/samba/samba-backtrace
    nsupdate command = /usr/local/bin/samba-nsupdate -g
    server string = FreeNAS Shared Data Server
    ea support = yes
    store dos attributes = yes
    hostname lookups = yes
    unix extensions = no
    time server = yes
    acl allow execute always = true
    acl check permissions = true
    dos filemode = yes
    multicast dns register = no
    domain logons = yes
    idmap config *: backend = tdb
    idmap config *: range = 90000001-100000000
    server role = member server
    netbios name = NAS01
    workgroup = GSSLINC
    realm = GSSLINC.LOCAL
    security = ADS
    client use spnego = yes
    cache directory = /var/tmp/.cache/.samba
    local master = no
    domain master = no
    preferred master = no
    winbind cache time = 7200
    winbind offline logon = yes
    winbind enum users = yes
    winbind enum groups = yes
    winbind nested groups = yes
    winbind use default domain = yes
    winbind refresh tickets = yes
    idmap config GSSLINC: backend = rid
    idmap config GSSLINC: range = 20000-90000000
    allow trusted domains = yes
    client ldap sasl wrapping = plain
    template shell = /bin/sh
    template homedir = /home/%U
    pid directory = /var/run/samba
    smb passwd file = /var/etc/private/smbpasswd
    private dir = /var/etc/private
    create mask = 0666
    directory mask = 0777
    client ntlmv2 auth = yes
    dos charset = CP437
    unix charset = UTF-8
    log level = 1
    

[Data]
    path = /mnt/User_Data
    comment = Shared Data
    printable = no
    veto files = /.snapshot/.windows/.mac/.zfs/
    writeable = yes
    browseable = yes
    recycle:repository = .recycle/%U
    recycle:keeptree = yes
    recycle:versions = yes
    recycle:touch = yes
    recycle:directory_mode = 0777
    recycle:subdir_mode = 0700
    vfs objects = zfsacl aio_pthread streams_xattr
    hide dot files = yes
    guest ok = no
    nfs4:mode = special
    nfs4:acedup = merge
    nfs4:chown = true
    zfsacl:acesort = dontcare


+--------------------------------------------------------------------------------+
+                                Kerberos Tickets                                +
+--------------------------------------------------------------------------------+
Credentials cache: FILE:/tmp/krb5cc_0
        Principal: Administrator@GSSLINC.LOCAL

  Issued           Expires        Principal
Jun 17 10:30:00  >>>Expired<<<  krbtgt/GSSLINC.LOCAL@GSSLINC.LOCAL


+--------------------------------------------------------------------------------+
+                       /usr/local/etc/openldap/ldap.conf                        +
+--------------------------------------------------------------------------------+
URI ldap://gsslinc.local
BASE DC=gsslinc,DC=local


+--------------------------------------------------------------------------------+
+                         /usr/local/etc/sssd/sssd.conf                          +
+--------------------------------------------------------------------------------+


+--------------------------------------------------------------------------------+
+                       /etc/directoryservice/LDAP/config                        +
+--------------------------------------------------------------------------------+


+--------------------------------------------------------------------------------+
+                            ldaptool get config_file                            +
+--------------------------------------------------------------------------------+
ldap_basedn=
ldap_binddn=
ldap_anonbind=0
ldap_hostname=
ldap_host=
ldap_port=389
ldap_usersuffix=
ldap_groupsuffix=
ldap_machinesuffix=
ldap_passwordsuffix=
ldap_sudosuffix=
ldap_krb_realm=
ldap_krb_kdc=
ldap_krb_admin_server=
ldap_krb_kpasswd_server=
ldap_keytab_name=
ldap_keytab_principal=
ldap_keytab_file=
ldap_ssl=off
ldap_has_samba_schema=0
ldap_use_default_domain=0
ldap_certfile=
ldap_idmap_backend=ldap
ldap_timeout=10
ldap_dns_timeout=10


+--------------------------------------------------------------------------------+
+                             LDAP Users and Groups                              +
+--------------------------------------------------------------------------------+
+--------------------------------------------------------------------------------+
+                                     Users                                      +
+--------------------------------------------------------------------------------+
root:$6$xbD3hNrqQrAUu444$oNQcqKIis5JpbR51r7nph6UxNhRKZ9ev5/cMAub614uHNLt7H/XDk0iFFr91pUGzSviXhsgYqjaTXl4dj7yo81:0:0:root:/root:/bin/csh
daemon:*:1:1:Owner of many system processes:/root:/usr/sbin/nologin
operator:*:2:5:System &:/:/usr/sbin/nologin
bin:*:3:7:Binaries Commands and Source:/:/usr/sbin/nologin
tty:*:4:65533:Tty Sandbox:/:/usr/sbin/nologin
kmem:*:5:2:KMem Sandbox:/:/usr/sbin/nologin
games:*:7:13:Games pseudo-user:/:/usr/sbin/nologin
news:*:8:8:News Subsystem:/:/usr/sbin/nologin
man:*:9:9:Mister Man Pages:/usr/share/man:/usr/sbin/nologin
sshd:*:22:22:Secure Shell Daemon:/var/empty:/usr/sbin/nologin
smmsp:*:25:25:Sendmail Submission User:/var/spool/clientmqueue:/usr/sbin/nologin
mailnull:*:26:26:Sendmail Default User:/var/spool/mqueue:/usr/sbin/nologin
bind:*:53:53:Bind Sandbox:/:/usr/sbin/nologin
proxy:*:62:62:Packet Filter pseudo-user:/nonexistent:/usr/sbin/nologin
_pflogd:*:64:64:pflogd privsep user:/var/empty:/usr/sbin/nologin
_dhcp:*:65:65:dhcp programs:/var/empty:/usr/sbin/nologin
uucp:*:66:66:UUCP pseudo-user:/var/spool/uucppublic:/usr/local/libexec/uucp/uucico
pop:*:68:6:Post Office Owner:/nonexistent:/usr/sbin/nologin
www:*:80:80:World Wide Web Owner:/nonexistent:/usr/sbin/nologin
nobody:*:65534:65534:Unprivileged user:/nonexistent:/usr/sbin/nologin
avahi:*:200:200:avahi user:/nonexistent:/usr/sbin/nologin
messagebus:*:201:201:messagebus user:/nonexistent:/usr/sbin/nologin
ftp:*:14:14::/nonexistent:/bin/csh
auditdistd:*:78:77:Auditdistd unprivileged user:/var/empty:/usr/sbin/nologin
hast:*:845:845:HAST unprivileged user:/var/empty:/usr/sbin/nologin
ladvd:*:79:78:ladvd user:/var/empty:/usr/sbin/nologin
webdav:*:666:666:WebDAV Anonymous User:/var/empty:/usr/sbin/nologin
nsc:$6$Fsbj46U01yWdql1y$r5yQR3EoOk8UAse4w89OuuIx8hwot0JEDmyDzEZ4QQM9QMp7c15luKYWbgfyyz5DUxOg2TM61SPVysklHhHxq0:1001:1001:Near Space Users:/nonexistent:/bin/csh
guest:*:20501:20514:Guest:/home/guest:/bin/sh
iusr_dell-j7oqsa23ow:*:21000:20513:IUSR_DELL-J7OQSA23OW:/home/iusr_dell-j7oqsa23ow:/bin/sh
sqldebugger:*:23615:20513:SQLDebugger:/home/sqldebugger:/bin/sh
administrator:*:20500:20513:Administrator:/home/administrator:/bin/sh
administrator tmpl:*:21127:20513:Administrator Template:/home/administrator tmpl:/bin/sh
krbtgt:*:20502:20513:krbtgt:/home/krbtgt:/bin/sh
billseymour:*:24645:20513:Bill Seymour:/home/billseymour:/bin/sh
network admin:*:24639:20513:Network Administrator:/home/network admin:/bin/sh
lkris:*:21139:20513:Kris Lachenmeier:/home/lkris:/bin/sh
timl:*:21138:20513:Tim Lachenmeier:/home/timl:/bin/sh
iwam_dell-j7oqsa23ow:*:21001:20513:IWAM_DELL-J7OQSA23OW:/home/iwam_dell-j7oqsa23ow:/bin/sh
support_388945a0:*:21004:20513:SUPPORT_388945a0:/home/support_388945a0:/bin/sh
iusr_srv-shu:*:22110:20513:IUSR_SRV-SHU:/home/iusr_srv-shu:/bin/sh
mobile user tmpl:*:21124:20513:Mobile User Template:/home/mobile user tmpl:/bin/sh
user tmpl:*:21125:20513:User Template:/home/user tmpl:/bin/sh
power user tmpl:*:21126:20513:Power User Template:/home/power user tmpl:/bin/sh
billsey:*:21151:20513:IT Support:/home/billsey:/bin/sh
flight ops 1:*:21192:20513:Flight Ops 1:/home/flight ops 1:/bin/sh
wertr:*:21206:20513:Wert Russert:/home/wertr:/bin/sh
rogerc:*:24124:20513:Roger Cox:/home/rogerc:/bin/sh
ricardocorrea:*:24123:20513:Ricardo Correa:/home/ricardocorrea:/bin/sh
peter:*:24127:20513:Peter Helman:/home/peter:/bin/sh
mluvara:*:24114:20513:Michael Luvara:/home/mluvara:/bin/sh
lucasb:*:24117:20513:Lucas Beveridge:/home/lucasb:/bin/sh
kcarter:*:24115:20513:Kelly Carter:/home/kcarter:/bin/sh
craigb:*:21201:20513:Craig Brunson:/home/craigb:/bin/sh
camw:*:24125:20513:Cameron Wilson:/home/camw:/bin/sh
joep:*:24116:20513:Joe Padberg:/home/joep:/bin/sh
ericb:*:24647:20513:Eric Byers:/home/ericb:/bin/sh
vicr:*:21205:20513:Vic Rogers:/home/vicr:/bin/sh
shuser:*:21197:20513:SHU Weather:/home/shuser:/bin/sh
briano:*:24130:20513:Brian Oglevie:/home/briano:/bin/sh
kevinc:*:21146:20513:Kevin Carlson:/home/kevinc:/bin/sh
russd:*:24651:20513:Russ Dewey:/home/russd:/bin/sh
jdlewis:*:23633:20513:JD Lewis:/home/jdlewis:/bin/sh
mattb:*:21145:20513:Matt Bingenheimer:/home/mattb:/bin/sh
markw:*:24654:20513:Mark Williamson:/home/markw:/bin/sh
regalf:*:24655:20513:Regal Ferrulli:/home/regalf:/bin/sh
kamit:*:21149:20513:Kami Tomlinson:/home/kamit:/bin/sh
scottc:*:24657:20513:Scott Couturier:/home/scottc:/bin/sh
amandac:*:36111:20513:Amanda Cairns:/home/amandac:/bin/sh
scanner:*:24119:20513:Scanner:/home/scanner:/bin/sh
sbs sts worker:*:21129:21119:STS Worker:/home/sbs sts worker:/bin/sh
webworkplacetools:*:24640:20513:Standard User with administration links:/home/webworkplacetools:/bin/sh
standard user:*:25610:20513:Standard User:/home/standard user:/bin/sh
efrische:*:36110:20513:Eric Frische:/home/efrische:/bin/sh
barbarap:*:23635:20513:Barbara Pruijn:/home/barbarap:/bin/sh
jackf:*:36614:20513:Jack Fox:/home/jackf:/bin/sh
patrick:*:36615:20513:Patrick Wright:/home/patrick:/bin/sh
brady:*:36616:20513:Brady Rhodes:/home/brady:/bin/sh
caleb:*:36617:20513:Caleb Oldenkamp:/home/caleb:/bin/sh
erics:*:36619:20513:Eric Simpkins:/home/erics:/bin/sh
melissaw:*:36620:20513:Melissa Warner:/home/melissaw:/bin/sh
kyleb:*:23645:20513:Kyle Bisson:/home/kyleb:/bin/sh
backup:*:23646:20513:Backup:/home/backup:/bin/sh
leifs:*:36624:20513:Leif Swanson:/home/leifs:/bin/sh
sharonm:*:23648:20513:Sharon Matney:/home/sharonm:/bin/sh
testuser:*:36625:20513:Test User:/home/testuser:/bin/sh
rogers:*:36626:20513:Roger Shipman:/home/rogers:/bin/sh
toddl:*:36630:20513:Todd Lester:/home/toddl:/bin/sh
danj:*:36631:20513:Dan Jensen:/home/danj:/bin/sh
phild:*:23653:20513:Phil Delurgio:/home/phild:/bin/sh
+--------------------------------------------------------------------------------+
+                                     Groups                                     +
+--------------------------------------------------------------------------------+
wheel:*:0:nsc
daemon:*:1:nsc
kmem:*:2:nsc
sys:*:3:nsc
tty:*:4:nsc
operator:*:5:uucp,nsc
mail:*:6:nsc
bin:*:7:nsc
news:*:8:nsc
man:*:9:nsc
games:*:13:nsc
ftp:*:14:nsc
staff:*:20:nsc
sshd:*:22:nsc
smmsp:*:25:nsc
mailnull:*:26:nsc
guest:*:31:nsc
bind:*:53:nsc
proxy:*:62:nsc
authpf:*:63:nsc
_pflogd:*:64:nsc
_dhcp:*:65:nsc
uucp:*:66:nsc
dialer:*:68:nsc
network:*:69:nsc
audit:*:77:nsc
www:*:80:nsc
nogroup:*:65533:nsc
nobody:*:65534:nsc
avahi:*:200:nsc
messagebus:*:201:nsc
hast:*:845:nsc
ladvd:*:78:nsc
webdav:*:666:nsc
nsc:*:1001
domain guests:x:20514
sbs remote operators:x:21118
domain users:x:20513
exchange domain servers:x:21130
denied rodc password replication group:x:20572:krbtgt
schema admins:x:20518:network admin,billseymour,lkris,administrator
domain admins:x:20512:network admin,billseymour,administrator tmpl,timl,lkris,administrator
enterprise admins:x:20519:network admin,billseymour,lkris,administrator
domain power users:x:21120:power user tmpl
enterprise read-only domain controllers:x:20498
read-only domain controllers:x:20521
group policy creator owners:x:20520:administrator
domain controllers:x:20516
domain computers:x:20515
ras and ias servers:x:20553
allowed rodc password replication group:x:20571
cert publishers:x:20517
stratos users:x:24122
user roles:x:24637:network admin,webworkplacetools,standard user
sbs p user templates:x:21113:mobile user tmpl,user tmpl
sbs admin templates:x:21114:mobile user tmpl,user tmpl,power user tmpl,administrator tmpl
sbs fax operators:x:21115
sbs folder operators:x:21116
sbs mail operators:x:21117
sbs sp admins:x:21119:administrator
sbs mobile users:x:21122:mobile user tmpl,power user tmpl,administrator tmpl,administrator
web workplace users:x:21123:mobile user tmpl,user tmpl,power user tmpl,administrator tmpl
scwrite:x:21213
scread:x:21212
dnsupdateproxy:x:21111
wsus reporters:x:24617
wsus administrators:x:24616
wins users:x:21006
vs developers:x:23614
telnetclients:x:21005
sqlserver2005sqlbrowseruser$win-eugso7lo7py:x:24643
sqlserver2005sqlbrowseruser$sbs-2008:x:24615
sqlserver2005mssqluser$srv-shu$microsoft##ssee:x:22111
sqlserver2005mssqluser$sbs-2008$sbsmonitoring:x:24614
sqlserver2005mssqluser$sbs-2008$microsoft##ssee:x:24613
sqlserver2005mssqlserveradhelperuser$win-eugso7lo7py:x:24644
sqlserver2005mssqlserveradhelperuser$sbs-2008:x:24612
sqlserver2005msfteuser$srv-shu$microsoft##ssee:x:22112
sqlserver2005msfteuser$sbs-2008$sbsmonitoring:x:24611
sqlserver2005msfteuser$sbs-2008$microsoft##ssee:x:24610
ows_2905457056_admin:x:21112
iis_wpg:x:21002:iwam_dell-j7oqsa23ow
helpservicesgroup:x:21003:support_388945a0
exchange enterprise servers:x:21131
dnsadmins:x:21110
dhcp users:x:21007
dhcp administrators:x:21008
debugger users:x:23613:rogers,administrator
visualsvn server admins:x:23622
sqlserver2005mssqluser$srv-nsc$microsoft##ssee:x:36610
sqlserver2005msfteuser$srv-nsc$microsoft##ssee:x:36611
wss_admin_wpg:x:23637
wss_restricted_wpg:x:23638
wss_wpg:x:23639
winrmremotewmiusers__:x:36613
nsc employees:x:23649:briano,billseymour,russd,kyleb,sharonm,timl,lkris,mattb,kevinc,kamit,jackf,brady,caleb,efrische,leifs


+--------------------------------------------------------------------------------+
+                           User and Group cache dump                            +
+--------------------------------------------------------------------------------+
FreeNAS_Users:
     pwd.struct_passwd(pw_name='bin', pw_passwd='*', pw_uid=3, pw_gid=7, pw_gecos='Binaries Commands and Source', pw_dir='/', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='tty', pw_passwd='*', pw_uid=4, pw_gid=65533, pw_gecos='Tty Sandbox', pw_dir='/', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='webdav', pw_passwd='*', pw_uid=666, pw_gid=666, pw_gecos='WebDAV Anonymous User', pw_dir='/var/empty', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='_dhcp', pw_passwd='*', pw_uid=65, pw_gid=65, pw_gecos='dhcp programs', pw_dir='/var/empty', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='www', pw_passwd='*', pw_uid=80, pw_gid=80, pw_gecos='World Wide Web Owner', pw_dir='/nonexistent', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='pop', pw_passwd='*', pw_uid=68, pw_gid=6, pw_gecos='Post Office Owner', pw_dir='/nonexistent', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='smmsp', pw_passwd='*', pw_uid=25, pw_gid=25, pw_gecos='Sendmail Submission User', pw_dir='/var/spool/clientmqueue', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='operator', pw_passwd='*', pw_uid=2, pw_gid=5, pw_gecos='System &', pw_dir='/', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='ftp', pw_passwd='*', pw_uid=14, pw_gid=14, pw_gecos='', pw_dir='/nonexistent', pw_shell='/bin/csh')
     pwd.struct_passwd(pw_name='uucp', pw_passwd='*', pw_uid=66, pw_gid=66, pw_gecos='UUCP pseudo-user', pw_dir='/var/spool/uucppublic', pw_shell='/usr/local/libexec/uucp/uucico')
     pwd.struct_passwd(pw_name='ladvd', pw_passwd='*', pw_uid=79, pw_gid=78, pw_gecos='ladvd user', pw_dir='/var/empty', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='mailnull', pw_passwd='*', pw_uid=26, pw_gid=26, pw_gecos='Sendmail Default User', pw_dir='/var/spool/mqueue', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='_pflogd', pw_passwd='*', pw_uid=64, pw_gid=64, pw_gecos='pflogd privsep user', pw_dir='/var/empty', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='nsc', pw_passwd='$6$Fsbj46U01yWdql1y$r5yQR3EoOk8UAse4w89OuuIx8hwot0JEDmyDzEZ4QQM9QMp7c15luKYWbgfyyz5DUxOg2TM61SPVysklHhHxq0', pw_uid=1001, pw_gid=1001, pw_gecos='Near Space Users', pw_dir='/nonexistent', pw_shell='/bin/csh')
     pwd.struct_passwd(pw_name='messagebus', pw_passwd='*', pw_uid=201, pw_gid=201, pw_gecos='messagebus user', pw_dir='/nonexistent', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='kmem', pw_passwd='*', pw_uid=5, pw_gid=2, pw_gecos='KMem Sandbox', pw_dir='/', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='nobody', pw_passwd='*', pw_uid=65534, pw_gid=65534, pw_gecos='Unprivileged user', pw_dir='/nonexistent', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='sshd', pw_passwd='*', pw_uid=22, pw_gid=22, pw_gecos='Secure Shell Daemon', pw_dir='/var/empty', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='proxy', pw_passwd='*', pw_uid=62, pw_gid=62, pw_gecos='Packet Filter pseudo-user', pw_dir='/nonexistent', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='hast', pw_passwd='*', pw_uid=845, pw_gid=845, pw_gecos='HAST unprivileged user', pw_dir='/var/empty', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='news', pw_passwd='*', pw_uid=8, pw_gid=8, pw_gecos='News Subsystem', pw_dir='/', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='man', pw_passwd='*', pw_uid=9, pw_gid=9, pw_gecos='Mister Man Pages', pw_dir='/usr/share/man', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='daemon', pw_passwd='*', pw_uid=1, pw_gid=1, pw_gecos='Owner of many system processes', pw_dir='/root', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='bind', pw_passwd='*', pw_uid=53, pw_gid=53, pw_gecos='Bind Sandbox', pw_dir='/', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='auditdistd', pw_passwd='*', pw_uid=78, pw_gid=77, pw_gecos='Auditdistd unprivileged user', pw_dir='/var/empty', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='games', pw_passwd='*', pw_uid=7, pw_gid=13, pw_gecos='Games pseudo-user', pw_dir='/', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='avahi', pw_passwd='*', pw_uid=200, pw_gid=200, pw_gecos='avahi user', pw_dir='/nonexistent', pw_shell='/usr/sbin/nologin')
     pwd.struct_passwd(pw_name='root', pw_passwd='$6$xbD3hNrqQrAUu444$oNQcqKIis5JpbR51r7nph6UxNhRKZ9ev5/cMAub614uHNLt7H/XDk0iFFr91pUGzSviXhsgYqjaTXl4dj7yo81', pw_uid=0, pw_gid=0, pw_gecos='root', pw_dir='/root', pw_shell='/bin/csh')
     pwd.struct_passwd(pw_name='administrator', pw_passwd='*', pw_uid=20500, pw_gid=20513, pw_gecos='', pw_dir='/home/administrator', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='administrator tmpl', pw_passwd='*', pw_uid=21127, pw_gid=20513, pw_gecos='Administrator Template', pw_dir='/home/administrator tmpl', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='billseymour', pw_passwd='*', pw_uid=24645, pw_gid=20513, pw_gecos='Bill Seymour', pw_dir='/home/billseymour', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='billsey', pw_passwd='*', pw_uid=21151, pw_gid=20513, pw_gecos='IT Support', pw_dir='/home/billsey', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='briano', pw_passwd='*', pw_uid=24130, pw_gid=20513, pw_gecos='Brian Oglevie', pw_dir='/home/briano', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='camw', pw_passwd='*', pw_uid=24125, pw_gid=20513, pw_gecos='Cameron Wilson', pw_dir='/home/camw', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='craigb', pw_passwd='*', pw_uid=21201, pw_gid=20513, pw_gecos='Craig Brunson', pw_dir='/home/craigb', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='danj', pw_passwd='*', pw_uid=36631, pw_gid=20513, pw_gecos='', pw_dir='/home/danj', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='ericb', pw_passwd='*', pw_uid=24647, pw_gid=20513, pw_gecos='Eric Byers', pw_dir='/home/ericb', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='flight ops 1', pw_passwd='*', pw_uid=21192, pw_gid=20513, pw_gecos='Flight Ops 1', pw_dir='/home/flight ops 1', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='guest', pw_passwd='*', pw_uid=20501, pw_gid=20514, pw_gecos='Guest', pw_dir='/home/guest', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='iusr_dell-j7oqsa23ow', pw_passwd='*', pw_uid=21000, pw_gid=20513, pw_gecos='IUSR_DELL-J7OQSA23OW', pw_dir='/home/iusr_dell-j7oqsa23ow', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='iusr_srv-shu', pw_passwd='*', pw_uid=22110, pw_gid=20513, pw_gecos='IUSR_SRV-SHU', pw_dir='/home/iusr_srv-shu', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='iwam_dell-j7oqsa23ow', pw_passwd='*', pw_uid=21001, pw_gid=20513, pw_gecos='IWAM_DELL-J7OQSA23OW', pw_dir='/home/iwam_dell-j7oqsa23ow', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='jackf', pw_passwd='*', pw_uid=36614, pw_gid=20513, pw_gecos='Jack Fox', pw_dir='/home/jackf', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='joep', pw_passwd='*', pw_uid=24116, pw_gid=20513, pw_gecos='Joe Padberg', pw_dir='/home/joep', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='kamit', pw_passwd='*', pw_uid=21149, pw_gid=20513, pw_gecos='', pw_dir='/home/kamit', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='kevinc', pw_passwd='*', pw_uid=21146, pw_gid=20513, pw_gecos='', pw_dir='/home/kevinc', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='lucasb', pw_passwd='*', pw_uid=24117, pw_gid=20513, pw_gecos='Lucas Beveridge', pw_dir='/home/lucasb', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='markw', pw_passwd='*', pw_uid=24654, pw_gid=20513, pw_gecos='Mark Williamson', pw_dir='/home/markw', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='mattb', pw_passwd='*', pw_uid=21145, pw_gid=20513, pw_gecos='', pw_dir='/home/mattb', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='mobile user tmpl', pw_passwd='*', pw_uid=21124, pw_gid=20513, pw_gecos='Mobile User Template', pw_dir='/home/mobile user tmpl', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='network admin', pw_passwd='*', pw_uid=24639, pw_gid=20513, pw_gecos='Network Administrator', pw_dir='/home/network admin', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='peter', pw_passwd='*', pw_uid=24127, pw_gid=20513, pw_gecos='Peter Helman', pw_dir='/home/peter', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='power user tmpl', pw_passwd='*', pw_uid=21126, pw_gid=20513, pw_gecos='Power User Template', pw_dir='/home/power user tmpl', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='regalf', pw_passwd='*', pw_uid=24655, pw_gid=20513, pw_gecos='Regal Ferrulli', pw_dir='/home/regalf', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='ricardocorrea', pw_passwd='*', pw_uid=24123, pw_gid=20513, pw_gecos='Ricardo Correa', pw_dir='/home/ricardocorrea', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='rogerc', pw_passwd='*', pw_uid=24124, pw_gid=20513, pw_gecos='Roger Cox', pw_dir='/home/rogerc', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='russd', pw_passwd='*', pw_uid=24651, pw_gid=20513, pw_gecos='', pw_dir='/home/russd', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='sbs sts worker', pw_passwd='*', pw_uid=21129, pw_gid=21119, pw_gecos='STS Worker', pw_dir='/home/sbs sts worker', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='shuser', pw_passwd='*', pw_uid=21197, pw_gid=20513, pw_gecos='', pw_dir='/home/shuser', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='sqldebugger', pw_passwd='*', pw_uid=23615, pw_gid=20513, pw_gecos='SQLDebugger', pw_dir='/home/sqldebugger', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='support_388945a0', pw_passwd='*', pw_uid=21004, pw_gid=20513, pw_gecos='SUPPORT_388945a0', pw_dir='/home/support_388945a0', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='scanner', pw_passwd='*', pw_uid=24119, pw_gid=20513, pw_gecos='Scanner', pw_dir='/home/scanner', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='scottc', pw_passwd='*', pw_uid=24657, pw_gid=20513, pw_gecos='Scott Couturier', pw_dir='/home/scottc', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='standard user', pw_passwd='*', pw_uid=25610, pw_gid=20513, pw_gecos='Standard User', pw_dir='/home/standard user', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='timl', pw_passwd='*', pw_uid=21138, pw_gid=20513, pw_gecos='', pw_dir='/home/timl', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='toddl', pw_passwd='*', pw_uid=36630, pw_gid=20513, pw_gecos='', pw_dir='/home/toddl', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='user tmpl', pw_passwd='*', pw_uid=21125, pw_gid=20513, pw_gecos='User Template', pw_dir='/home/user tmpl', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='vicr', pw_passwd='*', pw_uid=21205, pw_gid=20513, pw_gecos='Vic Rogers', pw_dir='/home/vicr', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='webworkplacetools', pw_passwd='*', pw_uid=24640, pw_gid=20513, pw_gecos='Standard User with administration links', pw_dir='/home/webworkplacetools', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='wertr', pw_passwd='*', pw_uid=21206, pw_gid=20513, pw_gecos='Wert Russert', pw_dir='/home/wertr', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='amandac', pw_passwd='*', pw_uid=36111, pw_gid=20513, pw_gecos='Amanda Cairns', pw_dir='/home/amandac', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='backup', pw_passwd='*', pw_uid=23646, pw_gid=20513, pw_gecos='Backup', pw_dir='/home/backup', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='barbarap', pw_passwd='*', pw_uid=23635, pw_gid=20513, pw_gecos='Barbara Pruijn', pw_dir='/home/barbarap', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='brady', pw_passwd='*', pw_uid=36616, pw_gid=20513, pw_gecos='', pw_dir='/home/brady', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='caleb', pw_passwd='*', pw_uid=36617, pw_gid=20513, pw_gecos='Caleb Oldenkamp', pw_dir='/home/caleb', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='efrische', pw_passwd='*', pw_uid=36110, pw_gid=20513, pw_gecos='Eric Frische', pw_dir='/home/efrische', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='erics', pw_passwd='*', pw_uid=36619, pw_gid=20513, pw_gecos='Eric Simpkins', pw_dir='/home/erics', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='jdlewis', pw_passwd='*', pw_uid=23633, pw_gid=20513, pw_gecos='JD Lewis', pw_dir='/home/jdlewis', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='kcarter', pw_passwd='*', pw_uid=24115, pw_gid=20513, pw_gecos='Kelly Carter', pw_dir='/home/kcarter', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='krbtgt', pw_passwd='*', pw_uid=20502, pw_gid=20513, pw_gecos='krbtgt', pw_dir='/home/krbtgt', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='kyleb', pw_passwd='*', pw_uid=23645, pw_gid=20513, pw_gecos='Kyle Bisson', pw_dir='/home/kyleb', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='leifs', pw_passwd='*', pw_uid=36624, pw_gid=20513, pw_gecos='', pw_dir='/home/leifs', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='lkris', pw_passwd='*', pw_uid=21139, pw_gid=20513, pw_gecos='Kris Lachenmeier', pw_dir='/home/lkris', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='melissaw', pw_passwd='*', pw_uid=36620, pw_gid=20513, pw_gecos='Melissa Warner', pw_dir='/home/melissaw', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='mluvara', pw_passwd='*', pw_uid=24114, pw_gid=20513, pw_gecos='Michael Luvara', pw_dir='/home/mluvara', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='patrick', pw_passwd='*', pw_uid=36615, pw_gid=20513, pw_gecos='Patrick Wright', pw_dir='/home/patrick', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='rogers', pw_passwd='*', pw_uid=36626, pw_gid=20513, pw_gecos='Roger Shipman', pw_dir='/home/rogers', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='sharonm', pw_passwd='*', pw_uid=23648, pw_gid=20513, pw_gecos='Sharon Matney', pw_dir='/home/sharonm', pw_shell='/bin/sh')
     pwd.struct_passwd(pw_name='testuser', pw_passwd='*', pw_uid=36625, pw_gid=20513, pw_gecos='Test User', pw_dir='/home/testuser', pw_shell='/bin/sh')



FreeNAS_Groups:
     grp.struct_group(gr_name='bin', gr_passwd='*', gr_gid=7, gr_mem=['nsc'])
     grp.struct_group(gr_name='tty', gr_passwd='*', gr_gid=4, gr_mem=['nsc'])
     grp.struct_group(gr_name='webdav', gr_passwd='*', gr_gid=666, gr_mem=['nsc'])
     grp.struct_group(gr_name='_dhcp', gr_passwd='*', gr_gid=65, gr_mem=['nsc'])
     grp.struct_group(gr_name='www', gr_passwd='*', gr_gid=80, gr_mem=['nsc'])
     grp.struct_group(gr_name='smmsp', gr_passwd='*', gr_gid=25, gr_mem=['nsc'])
     grp.struct_group(gr_name='operator', gr_passwd='*', gr_gid=5, gr_mem=['uucp', 'nsc'])
     grp.struct_group(gr_name='staff', gr_passwd='*', gr_gid=20, gr_mem=['nsc'])
     grp.struct_group(gr_name='ftp', gr_passwd='*', gr_gid=14, gr_mem=['nsc'])
     grp.struct_group(gr_name='uucp', gr_passwd='*', gr_gid=66, gr_mem=['nsc'])
     grp.struct_group(gr_name='ladvd', gr_passwd='*', gr_gid=78, gr_mem=['nsc'])
     grp.struct_group(gr_name='guest', gr_passwd='*', gr_gid=31, gr_mem=['nsc'])
     grp.struct_group(gr_name='mailnull', gr_passwd='*', gr_gid=26, gr_mem=['nsc'])
     grp.struct_group(gr_name='wheel', gr_passwd='*', gr_gid=0, gr_mem=['nsc'])
     grp.struct_group(gr_name='mail', gr_passwd='*', gr_gid=6, gr_mem=['nsc'])
     grp.struct_group(gr_name='man', gr_passwd='*', gr_gid=9, gr_mem=['nsc'])
     grp.struct_group(gr_name='_pflogd', gr_passwd='*', gr_gid=64, gr_mem=['nsc'])
     grp.struct_group(gr_name='nsc', gr_passwd='*', gr_gid=1001, gr_mem=[])
     grp.struct_group(gr_name='messagebus', gr_passwd='*', gr_gid=201, gr_mem=['nsc'])
     grp.struct_group(gr_name='kmem', gr_passwd='*', gr_gid=2, gr_mem=['nsc'])
     grp.struct_group(gr_name='nobody', gr_passwd='*', gr_gid=65534, gr_mem=['nsc'])
     grp.struct_group(gr_name='sshd', gr_passwd='*', gr_gid=22, gr_mem=['nsc'])
     grp.struct_group(gr_name='sys', gr_passwd='*', gr_gid=3, gr_mem=['nsc'])
     grp.struct_group(gr_name='proxy', gr_passwd='*', gr_gid=62, gr_mem=['nsc'])
     grp.struct_group(gr_name='hast', gr_passwd='*', gr_gid=845, gr_mem=['nsc'])
     grp.struct_group(gr_name='news', gr_passwd='*', gr_gid=8, gr_mem=['nsc'])
     grp.struct_group(gr_name='network', gr_passwd='*', gr_gid=69, gr_mem=['nsc'])
     grp.struct_group(gr_name='audit', gr_passwd='*', gr_gid=77, gr_mem=['nsc'])
     grp.struct_group(gr_name='daemon', gr_passwd='*', gr_gid=1, gr_mem=['nsc'])
     grp.struct_group(gr_name='nogroup', gr_passwd='*', gr_gid=65533, gr_mem=['nsc'])
     grp.struct_group(gr_name='bind', gr_passwd='*', gr_gid=53, gr_mem=['nsc'])
     grp.struct_group(gr_name='authpf', gr_passwd='*', gr_gid=63, gr_mem=['nsc'])
     grp.struct_group(gr_name='dialer', gr_passwd='*', gr_gid=68, gr_mem=['nsc'])
     grp.struct_group(gr_name='games', gr_passwd='*', gr_gid=13, gr_mem=['nsc'])
     grp.struct_group(gr_name='avahi', gr_passwd='*', gr_gid=200, gr_mem=['nsc'])
     grp.struct_group(gr_name='sbs admin templates', gr_passwd='x', gr_gid=21114, gr_mem=['mobile user tmpl', 'user tmpl', 'power user tmpl', 'administrator tmpl'])
     grp.struct_group(gr_name='all users', gr_passwd='x', gr_gid=24630, gr_mem=['joep', 'briano', 'billseymour', 'ericb', 'russd', 'markw', 'regalf', 'scottc', 'sbs sts worker', 'timl', 'lkris', 'mattb', 'kevinc', 'kamit', 'vicr'])
     grp.struct_group(gr_name='allowed rodc password replication group', gr_passwd='x', gr_gid=20571, gr_mem=[])
     grp.struct_group(gr_name='cert publishers', gr_passwd='x', gr_gid=20517, gr_mem=[])
     grp.struct_group(gr_name='dhcp administrators', gr_passwd='x', gr_gid=21008, gr_mem=[])
     grp.struct_group(gr_name='dhcp users', gr_passwd='x', gr_gid=21007, gr_mem=[])
     grp.struct_group(gr_name='debugger users', gr_passwd='x', gr_gid=23613, gr_mem=['rogers', 'administrator'])
     grp.struct_group(gr_name='denied rodc password replication group', gr_passwd='x', gr_gid=20572, gr_mem=['krbtgt'])
     grp.struct_group(gr_name='dnsadmins', gr_passwd='x', gr_gid=21110, gr_mem=[])
     grp.struct_group(gr_name='dnsupdateproxy', gr_passwd='x', gr_gid=21111, gr_mem=[])
     grp.struct_group(gr_name='domain admins', gr_passwd='x', gr_gid=20512, gr_mem=['network admin', 'billseymour', 'administrator tmpl', 'timl', 'lkris', 'administrator'])
     grp.struct_group(gr_name='domain computers', gr_passwd='x', gr_gid=20515, gr_mem=[])
     grp.struct_group(gr_name='domain controllers', gr_passwd='x', gr_gid=20516, gr_mem=[])
     grp.struct_group(gr_name='domain guests', gr_passwd='x', gr_gid=20514, gr_mem=[])
     grp.struct_group(gr_name='domain power users', gr_passwd='x', gr_gid=21120, gr_mem=['power user tmpl'])
     grp.struct_group(gr_name='domain users', gr_passwd='x', gr_gid=20513, gr_mem=[])
     grp.struct_group(gr_name='enterprise admins', gr_passwd='x', gr_gid=20519, gr_mem=['network admin', 'billseymour', 'lkris', 'administrator'])
     grp.struct_group(gr_name='enterprise read-only domain controllers', gr_passwd='x', gr_gid=20498, gr_mem=[])
     grp.struct_group(gr_name='exchange domain servers', gr_passwd='x', gr_gid=21130, gr_mem=[])
     grp.struct_group(gr_name='exchange enterprise servers', gr_passwd='x', gr_gid=21131, gr_mem=[])
     grp.struct_group(gr_name='sbs fax operators', gr_passwd='x', gr_gid=21115, gr_mem=[])
     grp.struct_group(gr_name='fsrmreports', gr_passwd='x', gr_gid=24642, gr_mem=[])
     grp.struct_group(gr_name='sbs folder operators', gr_passwd='x', gr_gid=21116, gr_mem=[])
     grp.struct_group(gr_name='gsslinc', gr_passwd='x', gr_gid=21135, gr_mem=['mobile user tmpl', 'user tmpl', 'power user tmpl', 'administrator tmpl'])
     grp.struct_group(gr_name='group policy creator owners', gr_passwd='x', gr_gid=20520, gr_mem=['administrator'])
     grp.struct_group(gr_name='helpservicesgroup', gr_passwd='x', gr_gid=21003, gr_mem=['support_388945a0'])
     grp.struct_group(gr_name='iis_wpg', gr_passwd='x', gr_gid=21002, gr_mem=['iwam_dell-j7oqsa23ow'])
     grp.struct_group(gr_name='sbs mail operators', gr_passwd='x', gr_gid=21117, gr_mem=[])
     grp.struct_group(gr_name='sbs mobile users', gr_passwd='x', gr_gid=21122, gr_mem=['mobile user tmpl', 'power user tmpl', 'administrator tmpl', 'administrator'])
     grp.struct_group(gr_name='nsc employees', gr_passwd='x', gr_gid=23649, gr_mem=['briano', 'billseymour', 'russd', 'kyleb', 'sharonm', 'timl', 'lkris', 'mattb', 'kevinc', 'kamit', 'jackf', 'brady', 'caleb', 'efrische', 'leifs'])
     grp.struct_group(gr_name='ows_2905457056_admin', gr_passwd='x', gr_gid=21112, gr_mem=[])
     grp.struct_group(gr_name='postmaster', gr_passwd='x', gr_gid=24641, gr_mem=[])
     grp.struct_group(gr_name='sbs p user templates', gr_passwd='x', gr_gid=21113, gr_mem=['mobile user tmpl', 'user tmpl'])
     grp.struct_group(gr_name='ras and ias servers', gr_passwd='x', gr_gid=20553, gr_mem=[])
     grp.struct_group(gr_name='read-only domain controllers', gr_passwd='x', gr_gid=20521, gr_mem=[])
     grp.struct_group(gr_name='sbs remote operators', gr_passwd='x', gr_gid=21118, gr_mem=[])
     grp.struct_group(gr_name='web workplace users', gr_passwd='x', gr_gid=21123, gr_mem=['mobile user tmpl', 'user tmpl', 'power user tmpl', 'administrator tmpl'])
     grp.struct_group(gr_name='scread', gr_passwd='x', gr_gid=21212, gr_mem=[])
     grp.struct_group(gr_name='scwrite', gr_passwd='x', gr_gid=21213, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005msfteuser$sbs-2008$microsoft##ssee', gr_passwd='x', gr_gid=24610, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005msfteuser$sbs-2008$sbsmonitoring', gr_passwd='x', gr_gid=24611, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005msfteuser$srv-nsc$microsoft##ssee', gr_passwd='x', gr_gid=36611, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005msfteuser$srv-shu$microsoft##ssee', gr_passwd='x', gr_gid=22112, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005mssqlserveradhelperuser$sbs-2008', gr_passwd='x', gr_gid=24612, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005mssqlserveradhelperuser$win-eugso7lo7py', gr_passwd='x', gr_gid=24644, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005mssqluser$sbs-2008$microsoft##ssee', gr_passwd='x', gr_gid=24613, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005mssqluser$sbs-2008$sbsmonitoring', gr_passwd='x', gr_gid=24614, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005mssqluser$srv-nsc$microsoft##ssee', gr_passwd='x', gr_gid=36610, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005mssqluser$srv-shu$microsoft##ssee', gr_passwd='x', gr_gid=22111, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005sqlbrowseruser$sbs-2008', gr_passwd='x', gr_gid=24615, gr_mem=[])
     grp.struct_group(gr_name='sqlserver2005sqlbrowseruser$win-eugso7lo7py', gr_passwd='x', gr_gid=24643, gr_mem=[])
     grp.struct_group(gr_name='stratos users', gr_passwd='x', gr_gid=24122, gr_mem=[])
     grp.struct_group(gr_name='schema admins', gr_passwd='x', gr_gid=20518, gr_mem=['network admin', 'billseymour', 'lkris', 'administrator'])
     grp.struct_group(gr_name='sbs sp admins', gr_passwd='x', gr_gid=21119, gr_mem=['administrator'])
     grp.struct_group(gr_name='telnetclients', gr_passwd='x', gr_gid=21005, gr_mem=[])
     grp.struct_group(gr_name='user roles', gr_passwd='x', gr_gid=24637, gr_mem=['network admin', 'webworkplacetools', 'standard user'])
     grp.struct_group(gr_name='vs developers', gr_passwd='x', gr_gid=23614, gr_mem=[])
     grp.struct_group(gr_name='visualsvn server admins', gr_passwd='x', gr_gid=23622, gr_mem=[])
     grp.struct_group(gr_name='wins users', gr_passwd='x', gr_gid=21006, gr_mem=[])
     grp.struct_group(gr_name='wss_admin_wpg', gr_passwd='x', gr_gid=23637, gr_mem=[])
     grp.struct_group(gr_name='wss_restricted_wpg', gr_passwd='x', gr_gid=23638, gr_mem=[])
     grp.struct_group(gr_name='wss_wpg', gr_passwd='x', gr_gid=23639, gr_mem=[])
     grp.struct_group(gr_name='wsus administrators', gr_passwd='x', gr_gid=24616, gr_mem=[])
     grp.struct_group(gr_name='wsus reporters', gr_passwd='x', gr_gid=24617, gr_mem=[])
     grp.struct_group(gr_name='winrmremotewmiusers__', gr_passwd='x', gr_gid=36613, gr_mem=[])


