In this section, you use WMI to configure networking components. However, instead of just dashing off a quick WMI script, you will take a step forward and begin combining several of the techniques looked at earlier in this book, such as writing to text files and reading from Active Directory. This little bit of magic will track every step of your networked operations, enabling you to avoid dire consequences should an operation fail to properly complete. The following summarizes a few uses for this configuration technique:
Import a list of computers from an OU in Active Directory
Import a list of users from an OU in Active Directory
Import a list of users from a group that resides in Active Directory
Read Active Directory and make ...