{
	"id": "6e099ff9-447c-4da5-8457-8e18bd03aa56",
	"created_at": "2026-04-06T00:16:26.113945Z",
	"updated_at": "2026-04-10T03:21:12.250036Z",
	"deleted_at": null,
	"sha1_hash": "1b2e5c809a6ec5b772bdbf17502f749df208924b",
	"title": "Dsquery",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 36709,
	"plain_text": "Dsquery\r\nBy Archiveddocs\r\nArchived: 2026-04-05 13:31:04 UTC\r\nApplies To: Windows Server 2003, Windows Server 2008, Windows Server 2003 R2, Windows Server 2008 R2,\r\nWindows Server 2012, Windows Server 2003 with SP1, Windows 8\r\nQueries the directory by using search criteria that you specify. Each of the dsquery commands finds objects of a\r\nspecific object type, with the exception of dsquery *, which can query for any type of object\r\nDsquery is a command-line tool that is built into Windows Server 2008. It is available if you have the\r\nActive Directory Domain Services (AD DS) server role installed. To use dsquery, you must run the dsquery\r\ncommand from an elevated command prompt. To open an elevated command prompt, click Start, right-click\r\nCommand Prompt, and then click Run as administrator.\r\nCommands\r\nCommand Description\r\nDsquery\r\ncomputer\r\nFinds computers in the directory that match search criteria that you specify.\r\nDsquery\r\ncontact\r\nFinds contacts in the directory that match search criteria that you specify.\r\nDsquery\r\ngroup\r\nFinds groups in the directory that match search criteria that you specify. If the predefined\r\nsearch criteria in this command are insufficient, use the general version of the query\r\ncommand, dsquery *.\r\nDsquery ou\r\nFinds organizational units (OUs) in the directory that match search criteria that you specify. If\r\nthe predefined search criteria in this command are insufficient, use the more general version\r\nof the query command, dsquery *.\r\nDsquery site Finds sites in the directory that match search criteria that you specify. If the predefined search\r\ncriteria in this command are insufficient, use the more general version of the query command,\r\nhttps://technet.microsoft.com/en-us/library/cc732952.aspx\r\nPage 1 of 2\n\nCommand Description\r\ndsquery *.\r\nDsquery\r\nserver\r\nFinds domain controllers according to specified search criteria. If the predefined search\r\ncriteria in this command are insufficient, use the more general version of the query command,\r\ndsquery *.\r\nDsquery\r\nuser\r\nFinds users in the directory that match search criteria that you specify. If the predefined\r\nsearch criteria in this command are insufficient, use the more general version of the query\r\ncommand, dsquery *.\r\nDsquery\r\nquota\r\nFinds quota specifications in the directory that match search criteria that you specify. A quota\r\nspecification determines the maximum number of directory objects a specified security\r\nprincipal can own in a given directory partition. If the predefined search criteria in this\r\ncommand are insufficient, use the more general version of the query command, dsquery *.\r\nDsquery\r\npartition\r\nFinds partition objects in the directory that match search criteria that you specify. If the\r\npredefined search criteria in this command are insufficient, use the more general version of\r\nthe query command, dsquery *.\r\nDsquery * Finds any objects in the directory according to criteria using an LDAP query.\r\nSource: https://technet.microsoft.com/en-us/library/cc732952.aspx\r\nhttps://technet.microsoft.com/en-us/library/cc732952.aspx\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://technet.microsoft.com/en-us/library/cc732952.aspx"
	],
	"report_names": [
		"cc732952.aspx"
	],
	"threat_actors": [],
	"ts_created_at": 1775434586,
	"ts_updated_at": 1775791272,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/1b2e5c809a6ec5b772bdbf17502f749df208924b.pdf",
		"text": "https://archive.orkl.eu/1b2e5c809a6ec5b772bdbf17502f749df208924b.txt",
		"img": "https://archive.orkl.eu/1b2e5c809a6ec5b772bdbf17502f749df208924b.jpg"
	}
}