IntuneAutomation

List Local Admin Users

This script retrieves the list of users who are members of the local admin group on macOS. It uses the Directory Service command line utility (dscl) to query the admin group membership. The output is formatted for Intune custom attributes to provide visibility into privileged access on managed devices.

MonitoringSecurity
536 views91 downloadsVersion 1.0By Ugur Koc
View on GitHub

// QUALITY CHECKS

Validation status

Quality checks

All checks pass
  • ShellCheckPass

Tests run automatically on every change. What does each check mean?

// TESTED PLATFORMS

Verified runtimes

macOS

// CHANGELOG

Version history

  1. Entry · 01

    1.0 - Initial release

// CODE

Source

local-admins.sh
#!/bin/bash

# TITLE: List Local Admin Users
# SYNOPSIS: Lists all users with local administrator privileges on macOS
# DESCRIPTION: This script retrieves the list of users who are members of the local admin
#              group on macOS. It uses the Directory Service command line utility (dscl)
#              to query the admin group membership. The output is formatted for Intune
#              custom attributes to provide visibility into privileged access on managed devices.
# TAGS: Monitoring,Security
# PLATFORM: macOS
# MIN_OS_VERSION: 10.15
# AUTHOR: Ugur Koc
# VERSION: 1.0
# LASTUPDATE: 2025-06-04
# CHANGELOG:
#   1.0 - Initial release
#
# EXAMPLE:
#   ./local-admins.sh
#   Outputs the list of local admin users
#
# NOTES:
#   - Uses dscl to query admin group membership
#   - No external dependencies required
#   - Designed for Intune custom attributes (single line output)
#   - Includes count of admin users for quick assessment
#   - For more scripts and guides, visit: IntuneMacAdmins.com

# ============================================================================
# VARIABLES AND INITIALIZATION
# ============================================================================

# ============================================================================
# FUNCTIONS
# ============================================================================

# Function to output result (for Intune custom attributes)
output_result() {
    # For Intune custom attributes, output should be a single line
    echo "$1"
    exit 0
}

# Function to check prerequisites
check_prerequisites() {
    if ! command -v dscl >/dev/null 2>&1; then
        output_result "Error: dscl command not found"
    fi
}

# Function to get admin users
get_admin_users() {
    # Query the admin group membership
    local admin_output
    if ! admin_output=$(dscl . -read /Groups/admin GroupMembership 2>&1); then
        # Check if it's a permission issue
        if echo "$admin_output" | grep -q "eDSPermissionError"; then
            output_result "Error: Permission denied"
        else
            output_result "Error: Unable to query admin group"
        fi
    fi

    # Extract just the user list (remove "GroupMembership:" prefix)
    local admin_list
    admin_list=${admin_output#GroupMembership: }

    # Check if we got valid output
    if [[ -z "$admin_list" ]] || [[ "$admin_list" == "$admin_output" ]]; then
        output_result "Error: No admin users found or invalid format"
    fi

    echo "$admin_list"
}

# ============================================================================
# MAIN SCRIPT LOGIC
# ============================================================================

main() {
    # Check prerequisites
    check_prerequisites

    # Get the list of admin users
    local admin_users
    admin_users=$(get_admin_users)

    # Count the number of admin users
    local admin_count
    admin_count=$(echo "$admin_users" | wc -w | tr -d ' ')

    # Format output for Intune custom attributes
    if [[ $admin_count -eq 0 ]]; then
        output_result "Admin Users: None found"
    elif [[ $admin_count -eq 1 ]]; then
        output_result "Admin Users (1): $admin_users"
    else
        # For multiple users, show count and list
        output_result "Admin Users ($admin_count): $admin_users"
    fi
}

# ============================================================================
# ERROR HANDLING
# ============================================================================

# For Intune custom attributes - handle errors gracefully
trap 'output_result "Error: Script failed"' ERR

# ============================================================================
# SCRIPT EXECUTION
# ============================================================================

# Only run main if script is executed directly (not sourced)
if [[ "${BASH_SOURCE[0]}" == "${0}" ]]; then
    main "$@"
fi

# Exit successfully (if not using output_result)
exit 0

// NOTES

Author notes

- Uses dscl to query admin group membership - No external dependencies required - Designed for Intune custom attributes (single line output) - Includes count of admin users for quick assessment - For more scripts and guides, visit: IntuneMacAdmins.com

// RELATED

Picked by shared tags, category, and script type — nothing magic, just metadata overlap.

  1. BitLocker Key Storage Checker

    This script connects to Microsoft Graph API, retrieves all Windows devices from Intune, and checks if each device has BitLocker recovery keys stored in Entra ID. The script provides detailed reporting on compliance status, identifies devices without stored keys, and exports comprehensive results to CSV format for further analysis. This helps ensure proper BitLocker key escrow for data recovery scenarios.

    MonitoringSecurity
  2. FileVault Key Storage Checker

    This script connects to Microsoft Graph API, retrieves all macOS devices from Intune, and checks if each device has FileVault recovery keys stored in Intune. The script provides detailed reporting on compliance status, identifies devices without stored keys, and exports comprehensive results to CSV format for further analysis. This helps ensure proper FileVault key escrow for data recovery scenarios.

    MonitoringSecurity
  3. Check XProtect and Security Status

    This script retrieves the current versions of macOS security components including XProtect, XProtect Remediator, and MRT (Malware Removal Tool). Additionally, it checks the status of critical security features like System Integrity Protection (SIP), Gatekeeper, and FileVault. Results are formatted for Intune custom attributes to provide comprehensive visibility into device security posture.

    MonitoringSecurity