Lithnet Password Protection for AD
Request a quote for supportDownloads
v1.1
v1.1
  • Home
    • About Lithnet Password Protection
  • Setup
    • Getting started
    • Downloads
    • Setup requirements
    • Installation
    • Creating a new store
    • Load compromised passwords into the store
    • Configure group policy
    • Testing the password filter
  • Auditing
    • Audit existing passwords
  • Help & Support
    • Testing the password filter
    • Troubleshooting steps
    • Frequently asked questions
    • Getting support
    • Change log
  • Advanced Help
    • Powershell reference
      • Add-BannedWord
      • Add-CompromisedPassword
      • Get-PasswordFilterConfig
      • Get-PasswordFilterPolicy
      • Get-PasswordFilterResult
      • Import-BannedWordHashes
      • Import-BannedWords
      • Import-CompromisedPasswordHashes
      • Import-CompromisedPasswords
      • Open-Store
      • Remove-BannedWord
      • Remove-CompromisedPassword
      • Set-PasswordFilterConfig
      • Sync-HashesFromHibp
      • Test-IsADUserPasswordCompromised
      • Test-IsBannedWord
      • Test-IsCompromisedPassword
    • Normalization Rules
    • Event logging and reporting
    • Configuring a length based complexity policy
    • Configuring a points based complexity policy
    • Understanding the store
Powered by GitBook
On this page
  • SYNOPSIS
  • SYNTAX
  • String (Default)
  • Hash
  • SecureString
  • DESCRIPTION
  • EXAMPLES
  • Example 1
  • PARAMETERS
  • -Hash
  • -Normalize
  • -SecureString
  • -Value
  • CommonParameters
  • INPUTS
  • System.String
  • System.Byte[]
  • System.Security.SecureString
  • OUTPUTS
  • System.Object
  • NOTES
  • RELATED LINKS
  1. Advanced Help
  2. Powershell reference

Test-IsCompromisedPassword

SYNOPSIS

Checks if a password is in the compromised password store

SYNTAX

String (Default)

Test-IsCompromisedPassword [-Value] <String> [-Normalize] [<CommonParameters>]

Hash

Test-IsCompromisedPassword [-Hash] <Byte[]> [<CommonParameters>]

SecureString

Test-IsCompromisedPassword [-SecureString] <SecureString> [-Normalize] [<CommonParameters>]

DESCRIPTION

The Test-IsCompromisedPassword cmdlet checks to see if a specified string matches a value in the compromised password store.

EXAMPLES

Example 1

# Add a password to the store
PS> Add-CompromisedPassword -Value password!!!

# Test the password and ensure it is found
PS> Test-IsCompromisedPassword -Value password!!!
True

This example adds a password to the compromised password store, and then tests it to ensure it is found

PARAMETERS

-Hash

A binary hash to test

Type: Byte[]
Parameter Sets: Hash
Aliases:

Required: True
Position: 1
Default value: None
Accept pipeline input: True (ByValue)
Accept wildcard characters: False

-Normalize

Normalizes the password before testing it against the store

Type: SwitchParameter
Parameter Sets: String, SecureString
Aliases:

Required: False
Position: 2
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-SecureString

The string to test as a SecureString.

Type: SecureString
Parameter Sets: SecureString
Aliases:

Required: True
Position: 1
Default value: None
Accept pipeline input: True (ByValue)
Accept wildcard characters: False

-Value

The string to test.

Type: String
Parameter Sets: String
Aliases:

Required: True
Position: 1
Default value: None
Accept pipeline input: True (ByValue)
Accept wildcard characters: False

CommonParameters

INPUTS

System.String

System.Byte[]

System.Security.SecureString

OUTPUTS

System.Object

The cmdlet returns a boolean value indicating whether the input string or hash matches a value in the compromised password store.

NOTES

RELATED LINKS

PreviousTest-IsBannedWordNextNormalization Rules

Last updated 2 years ago

This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see .

about_CommonParameters