Lithnet Password Protection for AD
Request a quote for supportDownloads
v1.0 - LPP
v1.0 - LPP
  • About Lithnet Password Protection
    • How does Password Protection help my organisation
    • Enterprise Support
  • Installation
    • Getting Started
    • Installation of Password Protection
    • Creating a new store
      • Understanding the store
    • Configure the password group policy
    • Testing the password filter
    • Audit existing passwords
    • Event logging and reporting
  • Configuration
    • Configuring a length based complexity policy
    • Configuring a points based complexity policy
  • Help & Support
    • Normalization Rules
  • Advanced Help
    • Powershell reference
      • Add-BannedWord
      • Add-CompromisedPassword
      • Get-PasswordFilterResult
      • Import-BannedWordHashes
      • Import-BannedWords
      • Import-CompromisedPasswordHashes
      • Import-CompromisedPasswords
      • Open-Store
      • Remove-BannedWord
      • Remove-CompromisedPassword
      • Test-IsADUserPasswordCompromised
      • Test-IsBannedWord
      • Test-IsCompromisedPassword
Powered by GitBook
On this page
  • Syntax
  • Parameters
  • Return value
  • Examples
  1. Advanced Help
  2. Powershell reference

Test-IsCompromisedPassword

PreviousTest-IsBannedWord

Last updated 3 years ago

The Test-IsCompromisedPassword cmdlet checks to see if a specified string matches a value in the compromised password store.

Syntax

Test-IsCompromisedPassword -Value <string> -Normalize

Test-IsCompromisedPassword -Hash <byte[]>

Test-IsCompromisedPassword -SecureString <SecureString> -Normalize

Parameters

Value

Required. The string to test.

Normalize

Optional. If specified, are applied to the password before being checked against the compromised password store. To test against the banned word store, use the cmdlet instead.

Hash

Required. A binary hash to test.

SecureString

Required. The string to test as a SecureString.

Return value

The cmdlet returns a boolean value indicating whether the input string or hash matches a value in the compromised password store.

Examples

# Add a password to the store
PS> Add-CompromisedPassword -Value password!!!

# Test the password and ensure it is found
PS> Test-IsCompromisedPassword -Value password!!!
True

# Prompt for a compromised password to test
PS> Test-IsCompromisedPassword -SecureString (Read-Host -Prompt "Enter the password to test" -AsSecureString)
normalization rules
Test‐IsBannedWord