Win32-SystemAccount - WMI Powershell sample
The foundations for Manageability in Windows 2019/2016/2012/2008 and Windows 10/7/XP are Windows Management Instrumentation (WMI; formerly WBEM) and WMI extensions for Windows Driver Model (WDM).
ActiveXperts Network Monitor provides the ability to build monitor check routines based on WMI. ActiveXperts has collected more than a hundred WMI samples. You can use these samples as a base for new check routines you can write yourself.
On this site, you can find many WMI samples.
The Win32_SystemAccount WMI class can be used in ActiveXperts Network Monitor to monitor your servers.
The Win32_SystemAccount WMI class represents a system account. The system account is used by the operating system and services that run under Windows NT. There are many services and processes within Windows NT that need the capability to logon internally, for example, during a Windows NT installation. The system account was designed for that purpose.
The system account is an internal account, does not show up in User Manager, cannot be added to any groups, and cannot have user rights assigned to it. However, the system account does show up on an NTFS file system volume in file manager, which is located in the Permissions section of the Security menu. By default, the system account is granted full control to all files on an NTFS file system volume, which means that the system account has the same functional privileges as the administrator account.
$computer = "LocalHost" $namespace = "root\CIMV2" Get-WmiObject -class Win32_SystemAccount -computername $computer -namespace $namespace