Lithnet Password Protection for AD
Request a quote for supportDownloads
v1.1
v1.1
  • Home
    • About Lithnet Password Protection
  • Setup
    • Getting started
    • Downloads
    • Setup requirements
    • Installation
    • Creating a new store
    • Load compromised passwords into the store
    • Configure group policy
    • Testing the password filter
  • Auditing
    • Audit existing passwords
  • Help & Support
    • Testing the password filter
    • Troubleshooting steps
    • Frequently asked questions
    • Getting support
    • Change log
  • Advanced Help
    • Powershell reference
      • Add-BannedWord
      • Add-CompromisedPassword
      • Get-PasswordFilterConfig
      • Get-PasswordFilterPolicy
      • Get-PasswordFilterResult
      • Import-BannedWordHashes
      • Import-BannedWords
      • Import-CompromisedPasswordHashes
      • Import-CompromisedPasswords
      • Open-Store
      • Remove-BannedWord
      • Remove-CompromisedPassword
      • Set-PasswordFilterConfig
      • Sync-HashesFromHibp
      • Test-IsADUserPasswordCompromised
      • Test-IsBannedWord
      • Test-IsCompromisedPassword
    • Normalization Rules
    • Event logging and reporting
    • Configuring a length based complexity policy
    • Configuring a points based complexity policy
    • Understanding the store
Powered by GitBook
On this page
  • SYNOPSIS
  • SYNTAX
  • String (Default)
  • SecureString
  • DESCRIPTION
  • EXAMPLES
  • Example 1
  • Example 2
  • PARAMETERS
  • -SecureString
  • -Value
  • CommonParameters
  • INPUTS
  • System.String
  • System.Security.SecureString
  • OUTPUTS
  • NOTES
  • RELATED LINKS
  1. Advanced Help
  2. Powershell reference

Add-CompromisedPassword

SYNOPSIS

Adds a compromised password to the store

SYNTAX

String (Default)

Add-CompromisedPassword [-Value] <String> [<CommonParameters>]

SecureString

Add-CompromisedPassword [-SecureString] <SecureString> [<CommonParameters>]

DESCRIPTION

This cmdlet adds a string into the compromised password store. When the password filter is configured to check against compromised passwords, any password that is an exact match to this string will rejected.

EXAMPLES

Example 1

Add-CompromisedPassword -Value "password"

This example adds a single compromised password to the store

Example 2

Add-CompromisedPassword -SecureString (Read-Host -Prompt "Enter the compromised password to add to the store" -AsSecureString)

This example prompts for a password to add to the compromised password store

PARAMETERS

-SecureString

The password to add to the compromised password store as a secure string

Type: SecureString
Parameter Sets: SecureString
Aliases:

Required: True
Position: 1
Default value: None
Accept pipeline input: True (ByValue)
Accept wildcard characters: False

-Value

The password to add to the compromised password store

Type: String
Parameter Sets: String
Aliases:

Required: True
Position: 1
Default value: None
Accept pipeline input: True (ByValue)
Accept wildcard characters: False

CommonParameters

INPUTS

System.String

System.Security.SecureString

OUTPUTS

NOTES

To import a file of compromised passwords, use the Import-CompromisedPassword cmdlet or the Import-CompromisedPasswordHashes cmdlets.

RELATED LINKS

PreviousAdd-BannedWordNextGet-PasswordFilterConfig

Last updated 2 years ago

This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see .

about_CommonParameters