Check if the machine is domain-joined:

(Get-CimInstance -ClassName Win32_ComputerSystem).Domain

Get detailed domain and role info:

Get-CimInstance -ClassName Win32_ComputerSystem | Select-Object Domain, DomainRole, PartOfDomain

Get the domain controller being used:

(Get-ADDomainController -Discover).Name

Using systeminfo to check domain:

systeminfo | Select-String "Domain"

Show Windows Defender Version

Get-MpComputerStatus | Select-Object EngineVersion, AMRunning, AMServiceVersion 

Enumerate all common sensitive filenames

Here’s a PowerShell command that recursively lists all files whose names case-insensitively contain common sensitive words often associated with credentials, configuration, or access control in Windows systems:

gci -Recurse -File | Where-Object { $_.Name -match '(?i)password|pass|conf|config|secret|token|auth|authentication|credential|creds|key|connection|access|admin|login|vault|env|certificate|cert|api|user|account|identity' } | Select-Object FullName