Overview
Enumerate managed devices and their properties. This provides comprehensive device intelligence including system information, user relationships, and management status from the SCCM database.Syntax
Parameters
The IP address, FQDN, or NetBIOS name of the SMS Provider to connect to
The three-character site code (e.g., “PS1”)
Filter devices by name pattern (supports partial matching)
Filter devices by last logged-on user
Specify properties to retrieve (can be used multiple times)
Custom WQL WHERE clause for advanced filtering
Return count of results only
Display all device properties
Examples
Key Properties
| Property | Description | Use Case |
|---|---|---|
Name | Device NetBIOS name | Primary identifier |
LastLogonUserName | Last logged-on user | User-device mapping |
LastLogonTimestamp | Last logon time | Activity analysis |
IPAddress | Network address | Network topology |
ResourceID | Unique SCCM identifier | Cross-referencing |
Client | SCCM client status | Management verification |
Domain | Active Directory domain | Domain analysis |
OperatingSystemNameandVersion | OS details | Vulnerability assessment |
Required Permissions
SMS Admins local group membership on the SMS Provider server
Intelligence Gathering
High-Value Targets
High-Value Targets
Admin Workstations:Active Systems:Servers:
Network Analysis
Network Analysis
IP Address Mapping:
- Identify network segments and VLANs
- Map internal network topology
- Find DMZ and management networks
- Analyze device naming conventions
- Identify organizational units
- Map physical locations
User-Device Relationships
User-Device Relationships
Primary User Mapping:
- Identify which users use which devices
- Find shared workstations
- Locate user-specific systems
- Identify devices with admin user access
- Find service account usage patterns
- Locate privileged access workstations
Filtering Strategies
Output Analysis
Device Naming Patterns
Device Naming Patterns
Common naming conventions reveal:
- DESKTOP- or WS-: Workstations
- SRV- or SERVER-: Servers
- DC- or DOM-: Domain controllers
- LAPTOP- or NB-: Mobile devices
User Pattern Analysis
User Pattern Analysis
User logon patterns indicate:
- Administrative accounts (admin, service prefixes)
- Shared accounts (generic names)
- Service accounts (svc- prefixes)
- Personal accounts (firstname.lastname)
Common Use Cases
Lateral Movement Planning
Lateral Movement Planning
Identify target systems for lateral movement:
- Admin workstations for credential harvesting
- Servers for privilege escalation
- Systems with specific user access
Asset Inventory
Asset Inventory
Comprehensive asset discovery:
- Total device count and distribution
- Operating system analysis
- Network segment mapping
User Activity Analysis
User Activity Analysis
Understand user behavior:
- Login patterns and frequency
- Device usage relationships
- Administrative access patterns
Related Commands
get users- Enumerate user accountsget collections- Analyze device collectionsget collection-members- Find collection membershipget primary-users- Map user-device relationships