(Get-CimInstance -ClassName Win32_ComputerSystem).Domain
Get-CimInstance -ClassName Win32_ComputerSystem | Select-Object Domain, DomainRole, PartOfDomain
(Get-ADDomainController -Discover).Name
systeminfo
to check domain:systeminfo | Select-String "Domain"
Get-MpComputerStatus | Select-Object EngineVersion, AMRunning, AMServiceVersion
Here’s a PowerShell command that recursively lists all files whose names case-insensitively contain common sensitive words often associated with credentials, configuration, or access control in Windows systems:
gci -Recurse -File | Where-Object { $_.Name -match '(?i)password|pass|conf|config|secret|token|auth|authentication|credential|creds|key|connection|access|admin|login|vault|env|certificate|cert|api|user|account|identity' } | Select-Object FullName