You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Documentation/CHANGELOG.md
+9-4Lines changed: 9 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,16 +5,20 @@ All notable changes to this project will be documented in this file. The format
5
5
6
6
## [Unreleased]
7
7
8
+
### Changed
9
+
- The PowerShell module now advertizes `Desktop` as the required edition. Note that *PowerShell Core* is not supported because of heavy dependency on Win32 API.
10
+
11
+
## [4.3] - 2020-04-02
12
+
8
13
### Added
9
14
10
15
- New logo and package icons!
11
-
- The new [Get-AzureADUserEx](PowerShell/Get-AzureADUserEx.md#get-azureaduserex) cmdlet can be used to retrieve FIDO and NGC keys from Azure Active Directory.
12
-
- Both [lastLogon](https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-ada1/93258066-276d-4357-8458-981c19caad95) and [lastLogonTimestamp](https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-ada1/530d7194-20f6-4aaa-8d80-9ca6b6350ad6) user account attributes are now exposed.
16
+
- The new [Get-AzureADUserEx](PowerShell/Get-AzureADUserEx.md#get-azureaduserex) cmdlet can be used to retrieve FIDO and NGC keys from Azure Active Directory, as the first tool on the market.
17
+
- Both [lastLogon](https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-ada1/93258066-276d-4357-8458-981c19caad95) and [lastLogonTimestamp](https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-ada1/530d7194-20f6-4aaa-8d80-9ca6b6350ad6) user account attributes are now exposed. The LastLogonDate PowerShell property returns whichever of these 2 values is available.
13
18
- The `-Server` parameter of the [Get-ADSIAccount](PowerShell/Get-ADSIAccount.md#get-adsiaccount) cmdlet now has the standard `-ComputerName` alias.
14
19
15
20
### Changed
16
21
17
-
- The PowerShell module now advertizes `Desktop` as the required edition. Note that *PowerShell Core* is not supported because of heavy dependency on Win32 API.
18
22
- Major [PowerShell module documentation](PowerShell/Readme.md#directory-services-internals-powershell-module) improvements.
19
23
20
24
## [4.2] - 2020-03-18
@@ -382,7 +386,8 @@ This is a [Chocolatey](https://chocolatey.org/packages/dsinternals-psmodule)-onl
Copy file name to clipboardExpand all lines: Documentation/PowerShell/Readme.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,12 +11,12 @@ Locale: en-US
11
11
# Directory Services Internals PowerShell Module
12
12
13
13
## Description
14
-
The DSInternals PowerShell Module exposes several internal features of Active Directory. These include offline ntds.dit file manipulation, password auditing, DC recovery from IFM backups and password hash calculation.
14
+
The DSInternals PowerShell Module exposes several internal features of Active Directory and Azure Active Directory. These include FIDO2 and NGC key auditing, offline ntds.dit file manipulation, password auditing, DC recovery from IFM backups and password hash calculation.
15
15
16
16
## Azure Active Directory Cmdlets
17
17
These cmdlets utilize an undocumented API endpoint that exposes information not available through the Microsoft Graph API nor Azure AD Graph API.
<description>This package is shared between all other DSInternals packages. It contains implementations of common hash functions used by Windows, including NT hash, LM hash and OrgId hash. It also contains methods for SysKey/BootKey retrieval.</description>
14
+
<description>This package is shared between all other DSInternals packages. Its main features are Azure AD Graph API and ADSI clients for for retrieval of cryptographic material. It contains implementations of common hash functions used by Windows, including NT hash, LM hash and OrgId hash. It also contains methods for SysKey/BootKey retrieval.</description>
15
15
<summary>This package is shared between all other DSInternals packages.</summary>
16
16
<releaseNotes>
17
-
- A property called LogonName has been added to the DsAccount class, to support multi-domain scenarios.
18
-
- Several bugs in the ADSI client have been fixed.
17
+
- Added the the AzureADClient class for FIDO2 and NGC key retrieval from Azure Active Directory.
18
+
- Both LastLogon and LastLogonTimestamp properties are now exposed on AD user accounts.
19
+
- Updated the package logo.
19
20
</releaseNotes>
20
21
<copyright>Copyright (c) 2015-2020 Michael Grafnetter. All rights reserved.</copyright>
21
-
<tags>ActiveDirectory Security</tags>
22
+
<tags>ActiveDirectory Security AD AAD Identity Active Directory</tags>
<description>DSInternals DataStore is an advanced framework for offline ntds.dit file manipulation. It can be used to extract password hashes from Active Directory backups or to modify the sIDHistory and primaryGroupId attributes.</description>
15
15
<summary>DSInternals DataStore is an advanced framework for offline ntds.dit file manipulation.</summary>
16
-
<releaseNotes>Directory accounts now contain domain information in the LogonName property.</releaseNotes>
16
+
<releaseNotes>
17
+
- Both LastLogon and LastLogonTimestamp properties are now exposed on AD user accounts.
18
+
- Updated the package logo.
19
+
</releaseNotes>
17
20
<copyright>Copyright (c) 2015-2020 Michael Grafnetter. All rights reserved.</copyright>
18
-
<tags>ActiveDirectory Security NTDS</tags>
21
+
<tags>ActiveDirectory Security NTDS AD Identity Active Directory</tags>
<summary>The DSInternals PowerShell Module exposes several internal features of Active Directory. These include offline ntds.dit file manipulation, password auditing, DC recovery from IFM backups and password hash calculation.</summary>
21
21
<description>The DSInternals PowerShell Module has these main features:
22
22
23
+
* [Azure Active Directory FIDO2 key auditing](../Documentation/PowerShell/Get-AzureADUserEx.md#get-azureaduserex) and retrieval of system information about all user-registered key credentials.
23
24
* [Active Directory password auditing](https://github.com/MichaelGrafnetter/DSInternals/blob/master/Documentation/PowerShell/Test-PasswordQuality.md) that discovers accounts sharing the same passwords or having passwords in a public database like [HaveIBeenPwned](https://haveibeenpwned.com) or in a custom dictionary.
24
25
* [Bare-metal recovery of domain controllers](https://github.com/MichaelGrafnetter/DSInternals/blob/master/Documentation/PowerShell/New-ADDBRestoreFromMediaScript.md) from just IFM backups (ntds.dit + SYSVOL).
25
26
* Offline ntds.dit file manipulation, including [hash dumping](https://github.com/MichaelGrafnetter/DSInternals/blob/master/Documentation/PowerShell/Get-ADDBAccount.md), [password resets](https://github.com/MichaelGrafnetter/DSInternals/blob/master/Documentation/PowerShell/Set-ADDBAccountPassword.md), [group membership changes](https://github.com/MichaelGrafnetter/DSInternals/blob/master/Documentation/PowerShell/Set-ADDBPrimaryGroup.md), [SID History injection](https://github.com/MichaelGrafnetter/DSInternals/blob/master/Documentation/PowerShell/Add-ADDBSidHistory.md) and [enabling](https://github.com/MichaelGrafnetter/DSInternals/blob/master/Documentation/PowerShell/Enable-ADDBAccount.md)/[disabling](https://github.com/MichaelGrafnetter/DSInternals/blob/master/Documentation/PowerShell/Disable-ADDBAccount.md) accounts.
@@ -36,9 +37,10 @@
36
37
## Disclaimer
37
38
Features exposed through these tools are not supported by Microsoft. Improper use might cause irreversible damage to domain controllers or negatively impact domain security.</description>
38
39
<releaseNotes>
39
-
* The Test-PasswordQuality cmdlet now supports cross-domain and cross-forest duplicate password detection.
40
-
* The Get-ADReplAccount, Get-ADReplBackupKey and Add-ADReplNgcKey cmdlets no longer require the Domain and NamingContext parameters to be specified, as their proper values are automatically retrieved from the target DC.
41
-
* Fixed multiple bugs related to Credential Roaming.
40
+
* Added the Get-AzureADUserEx cmdlet for FIDO2 and NGC key auditing in Azure Active Directory.
41
+
* Both LastLogon and LastLogonTimestamp properties are now exposed on user accounts.
42
+
* Improved display format of FIDO2 keys.
43
+
* Updated the package logo.
42
44
</releaseNotes>
43
45
<dependencies>
44
46
<!-- Windows Management Framework 3+. For OS prior to Windows 8 and Windows Server 2012. -->
Copy file name to clipboardExpand all lines: Src/DSInternals.PowerShell/DSInternals.psd1
+8-7Lines changed: 8 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -8,10 +8,10 @@
8
8
RootModule='DSInternals.Bootstrap.psm1'
9
9
10
10
# Version number of this module.
11
-
ModuleVersion='4.2'
11
+
ModuleVersion='4.3'
12
12
13
13
# Supported PSEditions
14
-
CompatiblePSEditions='Desktop'
14
+
#CompatiblePSEditions = 'Desktop'
15
15
16
16
# ID used to uniquely identify this module
17
17
GUID='766b3ad8-eb78-48e6-84bd-61b31d96b53e'
@@ -27,7 +27,7 @@ Copyright = '(c) 2015-2020 Michael Grafnetter. All rights reserved.'
27
27
28
28
# Description of the functionality provided by this module
29
29
Description=@"
30
-
The DSInternals PowerShell Module exposes several internal features of Active Directory. These include offline ntds.dit file manipulation, password auditing, DC recovery from IFM backups and password hash calculation.
30
+
The DSInternals PowerShell Module exposes several internal features of Active Directory and Azure Active Directory. These include FIDO2 and NGC key auditing, offline ntds.dit file manipulation, password auditing, DC recovery from IFM backups and password hash calculation.
31
31
32
32
DISCLAIMER: Features exposed through this module are not supported by Microsoft and it is therefore not intended to be used in production environments. Improper use might cause irreversible damage to domain controllers or negatively impact domain security.
33
33
"@
@@ -128,7 +128,7 @@ PrivateData = @{
128
128
PSData=@{
129
129
130
130
# Tags applied to this module. These help with module discovery in online galleries.
- The Test-PasswordQuality cmdlet now supports cross-domain and cross-forest duplicate password detection.
145
-
- The Get-ADReplAccount, Get-ADReplBackupKey and Add-ADReplNgcKey cmdlets no longer require the Domain and NamingContext parameters to be specified, as their proper values are automatically retrieved from the target DC.
146
-
- Fixed multiple bugs related to Credential Roaming.
144
+
- Added the Get-AzureADUserEx cmdlet for FIDO2 and NGC key auditing in Azure Active Directory.
145
+
- Both LastLogon and LastLogonTimestamp properties are now exposed on user accounts.
0 commit comments