| external help file | DSInternals.PowerShell.dll-Help.xml |
|---|---|
| Module Name | DSInternals |
| online version | https://github.com/MichaelGrafnetter/DSInternals/blob/master/Documentation/PowerShell/Get-ADDBAccount.md |
| schema | 2.0.0 |
Reads one or more accounts from a ntds.dit file, including secret attributes.
Get-ADDBAccount [-All] [-Properties <AccountPropertySets>] [-BootKey <Byte[]>]
[-ExportFormat <AccountExportFormat>] -DatabasePath <String> [-LogPath <String>] [<CommonParameters>]
Get-ADDBAccount [-Properties <AccountPropertySets>] [-BootKey <Byte[]>] [-ExportFormat <AccountExportFormat>]
[-SamAccountName] <String> -DatabasePath <String> [-LogPath <String>] [<CommonParameters>]
Get-ADDBAccount [-Properties <AccountPropertySets>] [-BootKey <Byte[]>] [-ExportFormat <AccountExportFormat>]
-ObjectSid <SecurityIdentifier> -DatabasePath <String> [-LogPath <String>] [<CommonParameters>]
Get-ADDBAccount [-Properties <AccountPropertySets>] [-BootKey <Byte[]>] [-ExportFormat <AccountExportFormat>]
-DistinguishedName <String> -DatabasePath <String> [-LogPath <String>] [<CommonParameters>]
Get-ADDBAccount [-Properties <AccountPropertySets>] [-BootKey <Byte[]>] [-ExportFormat <AccountExportFormat>]
-ObjectGuid <Guid> -DatabasePath <String> [-LogPath <String>] [<CommonParameters>]
Reads one or more accounts from an Active Directory database file. When provided with a boot key (AKA SysKey or system key), it also decrypts secret attributes.
PS C:\> Get-ADDBAccount -SamAccountName Administrator `
-DatabasePath 'C:\IFM Backup\Active Directory\ntds.dit'
<# Sample Output:
DistinguishedName: CN=Administrator,CN=Users,DC=contoso,DC=com
SamAccountName: Administrator
UserPrincipalName:
Enabled: True
Deleted: False
Sid: S-1-5-21-1236425271-2880748467-2592687428-500
Guid: b3d02974-6b1c-484c-9103-fd2f60d592c4
SamAccountType: User
UserAccountControl: NormalAccount, PasswordNeverExpires
Description: Built-in account for administering the computer/domain
Notes:
PrimaryGroupId: 513
AdminCount: True
SidHistory:
SupportedEncryptionTypes: Default
ServicePrincipalName:
LastLogonDate: 2/6/2025 12:26:33 PM
PasswordLastSet: 1/31/2025 10:24:08 AM
SecurityDescriptor: DiscretionaryAclPresent, SystemAclPresent, DiscretionaryAclAutoInherited, SystemAclAutoInherited, DiscretionaryAclProtected, SelfRelative
GivenName:
Surname:
Initials:
DisplayName:
Email:
StreetAddress:
City:
PostalCode:
State:
Country:
Office:
TelephoneNumber:
Mobile:
HomePhone:
Company:
Department:
JobTitle:
EmployeeID:
EmployeeNumber:
ProfilePath:
ScriptPath:
Key Credentials
Credential Roaming
Created:
Modified:
Credentials:
Secrets
NTHash:
LMHash:
NTHashHistory:
LMHashHistory:
SupplementalCredentials:
#>Retrieves information about a single user account from an Active Directory database. Secret attributes are not decrypted as no boot key is provided.
PS C:\> $key = Get-BootKey -SystemHiveFilePath 'C:\IFM Backup\registry\SYSTEM'
PS C:\> Get-ADDBAccount -DistinguishedName 'CN=Joe Smith,OU=Employees,DC=contoso,DC=com' `
-BootKey $key `
-DatabasePath 'C:\IFM Backup\Active Directory\ntds.dit'
<# Sample Output:
DistinguishedName: CN=Joe Smith,OU=Employees,DC=contoso,DC=com
SamAccountName: joe
UserPrincipalName: joe@contoso.com
Enabled: True
Deleted: False
Sid: S-1-5-21-1236425271-2880748467-2592687428-1110
Guid: 6fb7aca4-fe85-4dc5-9acd-b5b2529fe2bc
SamAccountType: User
UserAccountControl: NormalAccount, PasswordNeverExpires
Description: Joe's standard account
Notes: Lorem Ipsum
AdminCount: False
PrimaryGroupId: 513
SidHistory:
SupportedEncryptionTypes: Default
ServicePrincipalName:
LastLogonDate: 2/23/2015 10:27:18 AM
PasswordLastSet: 7/11/2014 11:35:47 AM
SecurityDescriptor: DiscretionaryAclPresent, SystemAclPresent, DiscretionaryAclAutoInherited, SystemAclAutoInherited, SelfRelative
GivenName: Joe
Surname: Smith
Initials: RR
DisplayName: Joe Smith
Email: joe@contoso.com
StreetAddress: 1 Microsoft Way
City: Redmond
PostalCode: 98052
State: Washington
Country: US
Office: A309
TelephoneNumber: 0118 999 881 999 119 7253
Mobile: (312) 555-0690
HomePhone: (408) 555-1439
Company: Contoso
Department: IT
JobTitle: Admin
EmployeeID:
EmployeeNumber:
Manager: CN=rodriquez,OU=Employees,DC=contoso,DC=com
ProfilePath:
ScriptPath:
Key Credentials
Usage=NGC, Source=ActiveDirectory, Device=1966d4da-14da-4581-a7a7-5e8e07e93ad9, Created=8/1/2019 10:53:12 PM, LastLogon=8/1/2019 10:53:12 PM
Usage=NGC, Source=ActiveDirectory, Device=cfe9a872-13ff-4751-a777-aec88c30a762, Created=8/1/2019 11:09:15 PM, LastLogon=8/1/2019 11:09:15 PM
Credential Roaming
Created: 3/12/2017 9:15:56 AM
Modified: 3/13/2017 10:01:18 AM
Credentials:
DPAPIMasterKey: joe\Protect\S-1-5-21-1236425271-2880748467-2592687428-1110\47070660-c259-4d90-8bc9-187605323450
DPAPIMasterKey: joe\Protect\S-1-5-21-1236425271-2880748467-2592687428-1110\7fc19508-7b85-4a7c-9e5d-15f9e00e7ce5
CryptoApiCertificate: joe\SystemCertificates\My\Certificates\574E4687133998544C0095C7B348C52CD398182E
CNGCertificate: joe\SystemCertificates\My\Certificates\3B83BFA7037F6A79B3F3D17D229E1BC097F35B51
RSAPrivateKey: joe\Crypto\RSA\S-1-5-21-1236425271-2880748467-2592687428-1110\701577141985b6923998dcca035c007a_f8b7bbef-d227-4ac7-badd-3a238a7f741e
CNGPrivateKey: joe\Crypto\Keys\E8F13C2BA0209401C4DFE839CD57375E26BBE38F
Secrets
NTHash: 92937945b518814341de3f726500d4ff
LMHash:
NTHashHistory:
Hash 01: 92937945b518814341de3f726500d4ff
LMHashHistory:
Hash 01: 30ce97eef1084cf1656cc4be70d68600
SupplementalCredentials:
ClearText:
NTLMStrongHash: 2c6d57beebeafdae65b3f40f2a0d5430
Kerberos:
Credentials:
DES_CBC_MD5
Key: 7f16bc4ada0b8a52
OldCredentials:
Salt: CONTOSO.COMjoe
Flags: 0
KerberosNew:
Credentials:
AES256_CTS_HMAC_SHA1_96
Key: cd541be0838c787b5c6a34d7b19274aee613545a0e6cc6f5ac5918d8a464d24f
Iterations: 4096
AES128_CTS_HMAC_SHA1_96
Key: 5c88972747bd454704c117ae52c474e4
Iterations: 4096
DES_CBC_MD5
Key: 7f16bc4ada0b8a52
Iterations: 4096
OldCredentials:
OlderCredentials:
ServiceCredentials:
Salt: CONTOSO.COMjoe
DefaultIterationCount: 4096
Flags: 0
WDigest:
Hash 01: 61fed940f0e8d03a49d3727f55800497
Hash 02: a1d54499dda6a6b5431f29a8d741a640
Hash 03: b6cdf00bc0c4578992f718de81251721
Hash 04: 61fed940f0e8d03a49d3727f55800497
Hash 05: a1d54499dda6a6b5431f29a8d741a640
Hash 06: 9a8991bd99763df2e37f1e1e67d71cc8
Hash 07: 61fed940f0e8d03a49d3727f55800497
Hash 08: 8a9fe94883c8ccf3bcfc6591ddd2288f
Hash 09: 8a9fe94883c8ccf3bcfc6591ddd2288f
Hash 10: 1b7b16b49ecd8d9d59c1d0db6fa2cc36
Hash 11: d4c24695cfa4dc3810a469d5efb8ecaf
Hash 12: 8a9fe94883c8ccf3bcfc6591ddd2288f
Hash 13: a5b8aa5088280298c8c27fa99dcaa1e3
Hash 14: d4c24695cfa4dc3810a469d5efb8ecaf
Hash 15: 1aa8e567622fe53d6fb36f1f34f12aaa
Hash 16: 1aa8e567622fe53d6fb36f1f34f12aaa
Hash 17: 2af425244079f8f45927c34fa115e45b
Hash 18: cf283a35102b820e25003b1ddf270221
Hash 19: b98c902c57449253e6f06b5d585866bd
Hash 20: 2a690b1eeda9cb8f3157a4a3ba0be9c3
Hash 21: af2654776d5f9f27f3283ecb0aa25011
Hash 22: af2654776d5f9f27f3283ecb0aa25011
Hash 23: ba6fe0513ed2a60ec253a41bbde6a837
Hash 24: 8bf5a67b598087be948e040f85c72b4d
Hash 25: 8bf5a67b598087be948e040f85c72b4d
Hash 26: aa5ff46d23a5c7ebd603e1793225350d
Hash 27: 656b6a7f5b52d05b3ce9168a2b7ac8ac
Hash 28: ae884c92ecd87e8d54f1844f09c5a519
Hash 29: a500a9e26afc9f817df8a07e15771577
#>Retrieves information about a single user account from an Active Directory database. Secret attributes are decrypted using the provided boot key.
PS C:\> $key = Get-BootKey -SystemHiveFilePath 'C:\IFM Backup\registry\SYSTEM'
PS C:\> Get-ADDBAccount -SamAccountName 'PC01$' `
-BootKey $key `
-DatabasePath 'C:\IFM Backup\Active Directory\ntds.dit'
<# Sample Output:
DistinguishedName: CN=PC01,CN=Computers,DC=contoso,DC=com
SamAccountName: PC01$
Enabled: True
Deleted: False
Sid: S-1-5-21-2072841070-1873892158-2095746001-1104
Guid: 34017f6d-a264-4681-8738-09780122884f
SamAccountType: Computer
UserAccountControl: WorkstationAccount
DNSHostName: PC01.contoso.com
OperatingSystem: Windows 11 Enterprise
OperatingSystemVersion: 10.0 (26100)
Description: John's computer
ManagedBy: CN=John Doe,OU=Employees,DC=contoso,DC=com
PrimaryGroupId: 515
Location: USA/WA/Seattle
SidHistory:
SupportedEncryptionTypes: RC4_HMAC, AES128_CTS_HMAC_SHA1_96, AES256_CTS_HMAC_SHA1_96
ServicePrincipalName: {HOST/PC01.contoso.com, RestrictedKrbHost/PC01.contoso.com, HOST/PC01, RestrictedKrbHost/PC01...}
LastLogonDate: 1/27/2025 9:22:36 AM
PasswordLastSet: 1/22/2025 9:23:45 PM
SecurityDescriptor: DiscretionaryAclPresent, SystemAclPresent, DiscretionaryAclAutoInherited, SystemAclAutoInherited, SelfRelative
LAPS
Password: A6a3#7%eb!57be, Expires: 1/24/2025 9:12:27 PM
Key Credentials
Usage: NGC, Source: AD, Device: , Created: 11/23/2024 10:58:30 PM
Secrets
NTHash: 0ec8485560274b5352fab8085f83f5cf
LMHash:
NTHashHistory:
Hash 01: 0ec8485560274b5352fab8085f83f5cf
Hash 02: d3981b0fa179f60b3eac48ea0aa06b62
Hash 03: f6ab2345d24e09993c972087d189a365
LMHashHistory:
Hash 01: ecb0097500ffd72b005071e31a237ed5
Hash 02: 1d16a311401fba1f5d95090cb4fcacdb
Hash 03: 1224652b76e22751d79a06a7ce796e56
SupplementalCredentials:
ClearText:
NTLMStrongHash:
Kerberos:
KerberosNew:
Credentials:
AES256_CTS_HMAC_SHA384_192
Key: f97e0809c70a0c88aa5e6bc2d891f44e56ded641425a9bb0e9468f83a89b23d1
Iterations: 4096
AES128_CTS_HMAC_SHA256_128
Key: b5bf869da88f6d23c7a7e0585fc4d385
Iterations: 4096
AES256_CTS_HMAC_SHA1_96
Key: 099378565ec8edb5be48624bf1af8569c63963a28cb5a2e165668b618bb39d0c
Iterations: 4096
AES128_CTS_HMAC_SHA1_96
Key: 483599c78841e3d14c91283a33ceaa38
Iterations: 4096
RC4_HMAC_NT
Key: 0ec8485560274b5352fab8085f83f5cf
Iterations: 4096
OldCredentials:
AES256_CTS_HMAC_SHA384_192
Key: ab6e6e6c22a3689cccfaee4a46744cd5fa25b466992246b9d5474090dc6a6d32
Iterations: 4096
AES128_CTS_HMAC_SHA256_128
Key: cca81c6d197a8619f81d67db8b2f510f
Iterations: 4096
AES256_CTS_HMAC_SHA1_96
Key: 7a59559a82e25d7c3b11ba9746a0af776905d404e17c07be9dc7f45689600017
Iterations: 4096
AES128_CTS_HMAC_SHA1_96
Key: 6203b2af5353b22f7948f4dc393fc2e3
Iterations: 4096
RC4_HMAC_NT
Key: d3981b0fa179f60b3eac48ea0aa06b62
Iterations: 4096
OlderCredentials:
AES256_CTS_HMAC_SHA384_192
Key: 662eb233817c7f92fe89d956b66522193848c94851176a962c76092932e195bd
Iterations: 4096
AES128_CTS_HMAC_SHA256_128
Key: 36b9535feaf1127aa3f7b4940345b6b9
Iterations: 4096
AES256_CTS_HMAC_SHA1_96
Key: 3bed800004f155ad9d7b7492ca1b4902b3dca64dbca503b94d8cdc622b3a69aa
Iterations: 4096
AES128_CTS_HMAC_SHA1_96
Key: 29f2bbec3fb8a177c788afc4c24d368a
Iterations: 4096
RC4_HMAC_NT
Key: f6ab2345d24e09993c972087d189a365
Iterations: 4096
ServiceCredentials:
AES256_CTS_HMAC_SHA384_192
Key: f97e0809c70a0c88aa5e6bc2d891f44e56ded641425a9bb0e9468f83a89b23d1
Iterations: 4096
AES128_CTS_HMAC_SHA256_128
Key: b5bf869da88f6d23c7a7e0585fc4d385
Iterations: 4096
AES256_CTS_HMAC_SHA1_96
Key: 099378565ec8edb5be48624bf1af8569c63963a28cb5a2e165668b618bb39d0c
Iterations: 4096
AES128_CTS_HMAC_SHA1_96
Key: 483599c78841e3d14c91283a33ceaa38
Iterations: 4096
Salt: CONTOSO.COMhostpc01.contoso.com
DefaultIterationCount: 4096
Flags: 0
WDigest:
Hash 01: 51ec1c08dc1515d691f86c35efd6951a
Hash 02: 0804fe417162838cee1b585e05403c7e
Hash 03: 51ec1c08dc1515d691f86c35efd6951a
Hash 04: 51ec1c08dc1515d691f86c35efd6951a
Hash 05: f7dfe69378cd20462567a3f12d306d9c
Hash 06: f7dfe69378cd20462567a3f12d306d9c
Hash 07: 84d3754825bb778f150e2e0f9e0ad791
Hash 08: c3f6531e37407660f4eaab3685b10c77
Hash 09: 7c9c69f0f4af01f24d00cd7fd40f0ad8
Hash 10: abbb73611689c4726a81d89adbb58a76
Hash 11: abbb73611689c4726a81d89adbb58a76
Hash 12: c3f6531e37407660f4eaab3685b10c77
Hash 13: c3f6531e37407660f4eaab3685b10c77
Hash 14: 2597e2d6baeb6a27746efa36afb108ce
Hash 15: b7e76a5d9451f3e9dbfcbab122dde4a7
Hash 16: 299ed0932d98d3c08f0037402cc4b025
Hash 17: 13188b1800edb36ce4a5ebae8bdc163d
Hash 18: cd9d520759c3919e442437eb84d3fecf
Hash 19: 7eb065737a969f09daf7650ca1aa9441
Hash 20: cd9d520759c3919e442437eb84d3fecf
Hash 21: b491f3531400f2a25ac123c74f698109
Hash 22: 55ab8a2e40e730d1d7426d5b71842021
Hash 23: b491f3531400f2a25ac123c74f698109
Hash 24: eec9350591609e3caef02e6ebc5b5da5
Hash 25: 9046b70b3f463105ac60d72d14d083ee
Hash 26: 45a252b159aec8f9e6a6c18dac468b47
Hash 27: a5e2fb397f93c24f53c055bb8e38975a
Hash 28: db978e9c18bca0774a2b53ddf9c20d45
Hash 29: a5e2fb397f93c24f53c055bb8e38975a
#>Retrieves information about a single computer account from an Active Directory database. Secret attributes are decrypted using the provided boot key.
PS C:\> $results = Get-ADDBAccount -DatabasePath '.\Active Directory\ntds.dit' `
-BootKey acdba64a3929261b04e5270c3ef973cf `
-All `
-Properties Secrets |
Test-PasswordQuality -WeakPasswordHashesSortedFile pwned-passwords-ntlm-ordered-by-hash-v5.txtPerforms an offline credential hygiene audit of AD database against HIBP.
PS C:\> Get-ADDBAccount -All -DatabasePath ntds.dit -BootKey $key -ExportFormat PwDump |
Where-Object SamAccountType -eq User |
Where-Object Enabled -eq $true |
Where-Object NTHash -ne $null |
Out-File -FilePath users.pwdump -Encoding asciiExports NT and LM password hashes from an Active Directory database to a pwdump file.
PS C:\> Get-ADDBBackupKey -DatabasePath '.\ADBackup\Active Directory\ntds.dit' `
-BootKey 0be7a2afe1713642182e9b96f73a75da |
Save-DPAPIBlob -DirectoryPath '.\Output'
PS C:\> Get-ADDBAccount -All -DatabasePath '.\ADBackup\Active Directory\ntds.dit' -Properties RoamedCredentials |
Save-DPAPIBlob -DirectoryPath '.\Output'Extracts DPAPI backup keys and roamed credentials (certificates, private keys, and DPAPI master keys) from an Active Directory database file and saves them to the Output directory. Also creates a file called kiwiscript.txt that contains mimikatz commands needed to decrypt the private keys.
PS C:\> Get-ADDBAccount -All -DatabasePath '.\ADBackup\Active Directory\ntds.dit' -Properties KeyCredentials |
Select-Object -ExpandProperty KeyCredentials |
Where-Object Usage -eq NGC |
Format-Table -View ROCA
<# Sample Output:
Usage IsWeak Source DeviceId Created Owner
----- ------ ------ -------- ------- -----
NGC True AzureAD fd591087-245c-4ff5-a5ea-c14de5e2b32d 2017-07-19 CN=John Doe,CN=Users,DC=contoso,DC=com
NGC False AD 1966d4da-14da-4581-a7a7-5e8e07e93ad9 2019-08-01 CN=Jane Doe,CN=Users,DC=contoso,DC=com
#>Lists weak public keys registered in Active Directory that were generated on ROCA-vulnerable TPMs.
PS C:\> $dc = Get-ADDBDomainController -DatabasePath '.\ADBackup\Active Directory\ntds.dit'
PS C:\> $adminSid = '{0}-500' -f $dc.DomainSid
PS C:\> $account = Get-ADDBAccount -Sid $adminSid `
-DatabasePath '.\ADBackup\Active Directory\ntds.dit' `
-BootKey 0be7a2afe1713642182e9b96f73a75daRetrieves information about a the the built-in Administrator account, even if it was renamed.
PS C:\> Get-ADDBAccount -DatabasePath '.\ADBackup\Active Directory\ntds.dit' -All -Properties LAPS | Select-Object -ExpandProperty LapsPasswords
<# Sample Output:
ComputerName Account Password Expires Source
------------ ------- -------- ------- -----
DC01 Administrator PluralTrimmingSuggest 2/3/2025 EncryptedDSRMPassword
DC02 Administrator RoundupFructoseRoundworm 2/3/2025 EncryptedDSRMPassword
ADFS01 WLapsAdmin HerbsSkidUnproven 2/3/2025 EncryptedPassword
PC01 Administrator A6a3#7%eb!57be4a4B95Z433 1/24/2025 CleartextPassword
#>Retrieves and decrypts all Windows+Legacy LAPS passwords from a ntds.dit file.
Indicates that all accounts will be read from the selected database.
Type: SwitchParameter
Parameter Sets: All
Aliases: AllAccounts, ReturnAllAccounts
Required: True
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: FalseSpecifies the boot key (AKA system key) that will be used to decrypt values of secret attributes.
Type: Byte[]
Parameter Sets: (All)
Aliases: key, SysKey, SystemKey
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: FalseSpecifies the path to a domain database, for instance, C:\Windows\NTDS\ntds.dit.
Type: String
Parameter Sets: (All)
Aliases: Database, DBPath, DatabaseFilePath, DBFilePath
Required: True
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: FalseSpecifies the identifier of an account that will be retrieved from the database.
Type: String
Parameter Sets: ByDN
Aliases: dn
Required: True
Position: Named
Default value: None
Accept pipeline input: True (ByPropertyName)
Accept wildcard characters: FalseSpecifies the format in which the account information will be displayed.
Type: AccountExportFormat
Parameter Sets: (All)
Aliases: View, ExportView, Format
Accepted values: JohnNT, JohnNTHistory, JohnLM, JohnLMHistory, HashcatNT, HashcatNTHistory, HashcatLM, HashcatLMHistory, NTHash, NTHashHistory, LMHash, LMHashHistory, Ophcrack, PWDump, PWDumpHistory
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: FalseSpecifies the path to a directory where the transaction log files are located. For instance, C:\Windows\NTDS. The default log directory is the one that contains the database file itself.
Type: String
Parameter Sets: (All)
Aliases: Log, TransactionLogPath
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: FalseSpecifies the identifier of an account that will be retrieved from the database.
Type: Guid
Parameter Sets: ByGuid
Aliases: Guid
Required: True
Position: Named
Default value: None
Accept pipeline input: True (ByPropertyName)
Accept wildcard characters: FalseSpecifies the identifier of an account that will be retrieved from the database.
Type: SecurityIdentifier
Parameter Sets: BySID
Aliases: Sid
Required: True
Position: Named
Default value: None
Accept pipeline input: True (ByPropertyName)
Accept wildcard characters: FalseSpecifies the set of properties that will be retrieved for each account.
Type: AccountPropertySets
Parameter Sets: (All)
Aliases: Property, PropertySets, PropertySet
Accepted values: None, DistinguishedName, GenericAccountInfo, GenericUserInfo, GenericComputerInfo, GenericInfo, SecurityDescriptor, NTHash, LMHash, PasswordHashes, NTHashHistory, LMHashHistory, PasswordHashHistory, SupplementalCredentials, Secrets, KeyCredentials, RoamedCredentials, WindowsLAPS, LegacyLAPS, LAPS, ManagedBy, Manager, All
Required: False
Position: Named
Default value: All
Accept pipeline input: False
Accept wildcard characters: FalseSpecifies the identifier of an account that will be retrieved from the database.
Type: String
Parameter Sets: ByName
Aliases: Login, sam
Required: True
Position: 0
Default value: None
Accept pipeline input: True (ByPropertyName)
Accept wildcard characters: FalseThis cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters.
Get-BootKey Get-ADDBServiceAccount Get-ADDBTrust Get-ADDBBitLockerRecoveryInformation Get-ADDBBackupKey Get-ADReplAccount Get-ADSIAccount Test-PasswordQuality Save-DPAPIBlob Get-ADKeyCredential Set-ADDBPrimaryGroup Add-ADDBSidHistory Set-ADDBAccountControl