Test-IsCompromisedPassword

SYNOPSIS

Checks if a password is in the compromised password store

SYNTAX

String (Default)

Test-IsCompromisedPassword [-Value] <String> [-Normalize] [<CommonParameters>]

Hash

Test-IsCompromisedPassword [-Hash] <Byte[]> [<CommonParameters>]

SecureString

Test-IsCompromisedPassword [-SecureString] <SecureString> [-Normalize] [<CommonParameters>]

DESCRIPTION

The Test-IsCompromisedPassword cmdlet checks to see if a specified string matches a value in the compromised password store.

EXAMPLES

Example 1

This example adds a password to the compromised password store, and then tests it to ensure it is found

PARAMETERS

-Hash

A binary hash to test

-Normalize

Normalizes the password before testing it against the store

-SecureString

The string to test as a SecureString.

-Value

The string to test.

CommonParameters

This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters.

INPUTS

System.String

System.Byte[]

System.Security.SecureString

OUTPUTS

System.Object

The cmdlet returns a boolean value indicating whether the input string or hash matches a value in the compromised password store.

NOTES

Last updated