for
Defender
©2012 Quest Software, Inc. ALL RIGHTS RESERVED.
This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser's personal use without the written permission of Quest Software, Inc.
If you have any questions regarding your potential use of this material, contact: Quest Software World Headquarters
LEGAL Dept 5 Polaris Way
Aliso Viejo, CA 92656 USA
www.quest.com
email: legal@quest.com
Refer to our Web site for regional and international office information.
TRADEMARKS
Quest, Quest Software, the Quest Software logo, and Defender are trademarks and registered trademarks of Quest Software, Inc in the United States of America and other countries. For a complete list of Quest Software's trademarks, please see http:// www.quest.com/legal/trademark-information.aspx. Other trademarks and registered trademarks are property of their respective owners.
Disclaimer
The information in this document is provided in connection with Quest products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest products. EXCEPT AS SET FORTH IN QUEST'S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Quest does not make any commitment to update the information contained in this document.
Powershell Management for Defender Updated - April 2012
Contents
I
NTRODUCTION. . . .3
U
SINGP
OWERS
HELLM
ANAGEMENT FORD
EFENDER. . . 3
I
NSTALLING ANDO
PENINGP
OWERS
HELLM
ANAGEMENT FORD
EFENDER. . . .3
I
NSTALLATIONR
EQUIREMENTS. . . .3
I
NSTALLINGM
ICROSOFT.NET F
RAMEWORK. . . .4
I
NSTALLINGM
ICROSOFTW
INDOWSP
OWERS
HELL. . . .4
I
NSTALLINGP
OWERS
HELLM
ANAGEMENT FORD
EFENDER. . . .4
O
PENINGP
OWERS
HELLM
ANAGEMENT FORD
EFENDER. . . .5
G
ETTINGH
ELP. . . .6
C
MDLETN
AMINGC
ONVENTIONS. . . .7
T
ABE
XPANSION TOA
UTO-C
OMPLETEN
AMES. . . .7
P
ARAMETERS. . . .8
P
ARAMETERD
ETAILS. . . .8
P
OSITIONALP
ARAMETERS. . . 10
S
YNTAX. . . 10
C
MDLETS. . . 11
C
MDLETR
EFERENCE. . . 12
A
DD-S
OFTWARET
OKENT
OU
SER. . . 13
A
DD-T
OKENT
OU
SER. . . 15
A
DD-T
OKENT
OU
SERB
ATCH. . . 16
F
IND-D
EFENDERT
OKEN. . . 21
G
ET-D
EFENDERL
ICENSE. . . 22
G
ET-D
EFENDERT
EMPORARYR
ESPONSES. . . 23
G
ET-D
EFENDERU
SERSL
ASTL
OGON. . . 24
G
ET-T
OKENSF
ORU
SER. . . 25
G
ET-U
NACTIVATEDS
OFTWARET
OKENS. . . 27
G
ET-U
SERSF
ORT
OKEN. . . 28
R
EMOVE-A
LLT
OKENSF
ROMU
SER. . . 29
R
EMOVE-D
EFENDERP
ASSWORD. . . 30
R
EMOVE-PINF
ROMU
SERT
OKEN. . . 31
R
EMOVE-T
EMPORARYR
ESPONSE. . . 32
R
EMOVE-T
OKENF
ROMU
SER. . . 33
R
EMOVE-T
OKENF
ROMU
SERB
ATCH. . . 35
R
ESET-D
EFENDERT
OKEN. . . 39
R
ESET-D
EFENDERV
IOLATIONC
OUNT. . . 40
S
ET-D
EFENDERP
ASSWORD. . . 41
S
ET-PINO
NU
SERT
OKEN. . . 43
S
ET-T
EMPORARYR
ESPONSE. . . 44
Introduction
PowerShell Management for Defender is implemented as a Windows PowerShell snap-in, providing an extension to the Windows PowerShell environment. To get acquainted with the basic features of Windows PowerShell, refer to the Windows PowerShell Getting Started Guide, which you can access at http://msdn.microsoft.com/en-us/ library/aa973757.aspx. For more detailed information on Windows PowerShell, see the Windows PowerShell Primer document, which is included with the Windows PowerShell installation.
As the commands provided by PowerShell Management for Defender conform to the Windows PowerShell standards, and are fully compatible with the default command-line tools that come with Windows PowerShell, the information found in Microsoft’s PowerShell documentation is fully applicable.
This document details how to install, configure and use PowerShell Management for Defender. If you require a visual application as an alternative to using a DOS style command line utility, please visit
http://
www.powergui.org
PowerShell Management for Defender provides a command-line management interface for administering Defender attributes within Active Directory.
This document provides information on the basic concepts and features, and includes reference topics about the commands (cmdlets) that can be run.
Using PowerShell Management for Defender
PowerShell Management for Defender, built on Microsoft Windows PowerShell technology, provides a command-line interface that enables automation of Defender administrative tasks. With PowerShell Management for Defender, administrators can administer token related tasks such as assigning tokens to users, assigning a PIN or checking for expired tokens.
The PowerShell Management for Defender command-line tools (cmdlets), like all the Windows PowerShell cmdlets, are designed to deal with objects—structured information that is more than just a string of characters appearing on the screen. The cmdlets do not use text as the basis for interaction with the system, but use an object model that is based on the Microsoft .NET platform. In contrast to traditional, text-based commands, the cmdlets do not require the use of text-processing tools to extract specific information. Rather, you can access portions of the data directly by using standard Windows PowerShell object manipulation commands.
Installing and Opening PowerShell Management
for Defender
Installation Requirements
Before you install, ensure that your system has the following software installed: • Windows 2003 Service Pack 1, or later versions of Windows
• Microsoft .NET Framework 3.5 Service Pack 1, or a later version of .NET Framework • Microsoft Windows PowerShell 1.0 or 2.0
Installing Microsoft Windows PowerShell
For information on how to download and install Microsoft Windows PowerShell 1.0, see Microsoft’s Knowledge Base article 926139, Windows PowerShell 1.0 English Language Installation Packages for Windows Server 2003 and for Windows XP, at http://support.microsoft.com/?kbid=926139
If you are running Windows Server 2008, to install Windows PowerShell, perform the following steps: 1. Click Start, and then click Control Panel.
2. In Control Panel, double-click Administrative Tools. 3. In Administrative Tools, double-click Server Manager.
4. In Server Manager, in the console tree, click Features, and then in the details pane, click Add Features.
5. In the Add Features Wizard, select Windows PowerShell, and then complete the wizard. We recommend that you install Windows Management Framework, to upgrade your Windows PowerShell installation to version 2.0. For information on how to download and install Windows Management Framework, see Microsoft’s Knowledge Base article 968929, Windows Management Framework (Windows PowerShell 2.0, WinRM 2.0, and BITS 4.0), at http://support.microsoft.com/?kbid=968929.
Installing PowerShell Management for Defender
To install:
1. Run either setup.exe or the correct msi installer, as detailed below, included with the PowerShell Man-agement for Defender distribution package.
2. Follow the instructions on the installation wizard pages. x86 and x64 versions are available:
x86 = PowerShell Management for Defender.msi x64 = PowerShell Management for Defender (x64).msi
Opening PowerShell Management for Defender
You can open PowerShell Management for Defender by using either of the following procedures. Each procedure loads the snap-in into Windows PowerShell. If you do not load the PowerShell Management for Defender snap-in before you run a command (cmdlet) provided by that snap-in, you will receive an error.
To open PowerShell Management for Defender from the Programs menu, select Start, All Programs, Quest Software, PowerShell Management for Defender.
To add the PowerShell Management for Defender snap-in from Windows PowerShell: 1. Start Windows PowerShell.
2. Verify that the application is available to Microsoft PowerShell. To do this from PowerShell, run:
Get-PSSnapin -registered
The following text is displayed:
Name :Quest.Defender.AdminTools PSVersion : 1.0
Description : This Windows PowerShell snap-in contains cmdlets to manage Quest Defender.
3. If PowerShell commands for Defender has not been added enter the following in the command prompt:
Getting Help
PowerShell Management for Defender uses the Windows PowerShell help cmdlets to assist you in finding the appropriate information to accomplish your task. The following table provides some examples of how to use the Get-Help and Get-Command cmdlets to access the help information that is available for each cmdlet.
Command Description
Get-Help When you use Get-Help without any parameters, you are presented with basic instruc-tions on how to use the help system in Windows PowerShell.
Get-Help <Cmdlet> When you use Get-Help with the name of a cmdlet as an argument, you are presented with the help information for that cmdlet.
For example, to retrieve the help information for Add-TokenToUser, use either of the following commands:
• Get-Help Add-TokenToUser
• Get-Help Add-TokenToUser -detailed • Get-Help Add-TokenToUser -full
Get-Command Get-Command without any parameters lists all the cmdlets that are available to the shell. You can use the Get-Command cmdlet with the Format-List or Format-Table cmd-let to provide a more readable display.
For example, use Get-Command | Format-List to display the output in a list format. Get-Command <Cmdlet> When you use Get-Command with the name of a cmdlet as an argument, you are
presented with information about the parameters and other components of that cmdlet. The <Cmdlet> entry allows for wildcard character expansion.
For example, to retrieve information about the cmdlets with the names ending in Batch, you can use the following command:
• Get-Command *Batch Get-Command -Noun
<CmdletNoun> Get-Command -Noun <CmdletNoun> lists all the cmdlets with the names that include the specified noun. <CmdletNoun> allows for wildcard character expansion. Thus, you can use the following command to list all the cmdlets provided by PowerShell com-mands for Defender that include Token as part of the cmdlet:
Cmdlet Naming Conventions
All cmdlets are presented in verb-noun pairs. The verb-noun pair is separated by a hyphen (-) without spaces, and the cmdlet nouns are always singular. The verb refers to the action that the cmdlet performs. The noun identifies the entity on which the action is performed. For example, in the Add-TokenToUsercmdlet name, the verb is Add and the noun is TokenToUser.
You can use the following commands to list all cmdlets found in PowerShell Management for Defender: • Get-Command Quest.Defender.AdminTools\* (PowerShell v1.0)
• Get-Command –module Quest.Defender.AdminTools (PowerShell v2.0)
Tab Expansion to Auto-Complete Names
PowerShell Management for Defender provides a way to complete command and parameter names
automatically, thus speeding up command entry. You can fill in cmdlet names and parameters by pressing the TAB key.
To use tab expansion on a cmdlet name, type the entire first part of the name (the verb) and the hyphen that follows it, and then press TAB. The shell will complete the cmdlet name if a matching cmdlet is found. If multiple matching cmdlet names exist, repeatedly pressing TAB will cycle through all of the available choices. You can fill in more of the name for a partial match.
The following example shows how you can use tab expansion when you enter a cmdlet name:
Add-Token <TAB>
As you press the TAB key in this example, the shell cycles through all the cmdlet names that begin with
Add-Token
and you will see:Add-TokenToUser
Add-TokenToUserBatch
You can also use tab expansion when you want the shell to complete the partial parameter name that you have entered. In this case, you must specify the full cmdlet name, either by typing it in directly or by using tab expansion. The following example shows how you can use tab expansion when you enter a parameter name:
Add-TokenToUser -u <TAB>
As you press the TAB key in this example, the shell completes the
UserCommonName
parameter on theParameters
Cmdlets use parameters to take information necessary for completing their tasks. Parameters are string elements that follow the name of a cmdlet, either identifying an object and its attributes to act upon, or controlling how the cmdlet performs its task. The name of the parameter is preceded by a hyphen (-) and followed by the value of the parameter as follows:
Verb-Noun -ParameterName <ParameterValue>
In this example, the hyphen in front of the parameter name indicates that the word immediately following the hyphen is a parameter passed to the cmdlet and the next separate string after the parameter name is the value of the parameter.
In the examples included within the Cmdlets Reference section later in this document we have provided examples, omitting the parameter name where possible to simplify the command.
Parameter Details
The information displayed by the Get-Help cmdlet includes the Parameters section (also called metadata) on each parameter. The following example is an excerpt from the output of the Get-Help Add-TokenToUser -full command:
Name
Add-TokenToUser
Synopsis
Assigns a Defender token to a user. Syntax
Add-TokenToUser UserCommonName] <string> TokenCommonName] <string>
[-UserSearchBase <string>] [-TokenSearchBase <string>] [<CommonParameters>]
Detailed Description
Assigns a Defender token to a user. For batch assignment of many users or tokens, the
Add-TokenToUserBatch command will provide better performance than repeated running of the tool using assign.
-UserCommonName <string> Common name of the user to whom the token will be assigned. Required True
Position 0 Default
Accept pipeline input? False Accept wildcard chara ters? False
-TokenCommonName <string> Common name of the token to be assigned. Required True
Position 1 Default Value
Accept pipeline input? False Accept wildcard chara ters? False
-UserSearchBase <string> Optional parameter to specify base container from which to search for users. Required False
Position Named Default Value
Accept pipeline input? False Accept wildcard characters? False <CommonParameters>
This cmdlet supports the common parameters: -Verbose, -Debug, -ErrorAction, -ErrorVariable, and -OutVariable. For more information, type, "get-help about_commonparameters".
Input Type Return Type Related Links
Positional Parameters
A positional parameter lets you specify the parameter’s value without specifying the parameter’s name. A positional parameter has the Position attribute set to an integer in the metadata. This integer indicates the position on the command line where the cmdlet can find the parameter’s value.
An example of a positional parameter is the UserCommonName parameter. This parameter is always in position 0 if it is available on a cmdlet. The following two commands perform the same task: listing the Defender tokens assigned to a user:
• Get-AllTokensForUser -UserCommonName "Bob Smith" • Get-AllTokensForUser "Bob Smith"
If a parameter is not a positional parameter, it is considered to be a named parameter. When you enter a command on the command line, you must type the parameter name for a named parameter.
Syntax
PowerShell Management for Defender follows the Windows PowerShell command conventions that help you understand what information is required or optional when you run a cmdlet and how you must present the parameters and their values. The following table lists these command conventions.
In the documentation, all cmdlets display their associated parameters in parameter sets. These are groupings of parameters that can be used with each other. Although a cmdlet may have multiple parameter sets, most cmdlets have only one set of parameters. The following example displays the parameter set of the Add-TokenToUser cmdlet:
Add-TokenToUser UserCommonName] <string> TokenCommonName] <string>
[-UserSearchBase <string>] [-TokenSearchBase <string>] [<CommonParameters>]
In this example:
• the UserCommonName and TokenCommonName parameters are enclosed in square brackets to indicate that you can specify the string value for this parameter without typing -UserCommonName or -TokenCom-monName (these are positional parameters, see Positional Parameters on page10 of this document). • the UserSearchBase and TokenSearchBase parameters along with their parameter values are enclosed in
square brackets, to indicate that these are optional parameters, so each of these parameters along with their values can be omitted.
Symbol Description
- A hyphen indicates that the next word on the command line is a parameter. For more information about parameters, see “Parameters” earlier in this document.
<> Angle brackets are used to indicate parameter values along with the parameter type setting. This setting specifies the form that the parameter's value should take, and refers to the .NET type that determines the kind of value that is permitted as a parameter argument. For example, <Int32> indicates that the parameter argument must be an integer; <String> indicates that the argument must be in the form of a character string. If the string contains spaces, the value must be enclosed in quotation marks or the spaces must be preceded by the escape character (`).
The angle brackets are only intended to help you understand how a command should be con-structed. You do not type these brackets when you enter the command on the command line. [] Square brackets are used to indicate an optional parameter and its value. A parameter and its value
that are not enclosed in square brackets are required. If you do not supply a required parameter on the command line, the shell prompts you for that parameter. The square brackets are only intended to help you understand how a command should be constructed. You do not type these brackets when you enter the command on the command line.
Cmdlets
The following cmdlets are available in PowerShell Management for Defender version 5.7: • Add-SoftwareTokenToUser • Add-TokenToUser • Add-TokenToUserBatch • Find-DefenderToken • Get-DefenderLicense • Get-DefenderTemporaryResponses • Get-DefenderUsersLastLogon • Get-TokensForUser • Get-UnactivatedSoftwareTokens • Get-UsersForToken • Remove-AllTokensFromUser • Remove-DefenderPassword • Remove-PINFromUserToken • Remove-TemporaryResponse • Remove-TokenFromUser • Remove-TokenFromUserBatch • Reset-DefenderToken • Reset-DefenderViolationCount • Set-DefenderPassword • Set-PINOnUserToken • Set-TemporaryResponse • Test-DefenderToken
Cmdlet Reference
All Cmdlets are shown below in BOLD text. If the cmdlet requires any additional information, you can enter this on the command line. When you run the cmdlet, PowerShell Management for Defender will prompt for any missing information.
For each cmdlet referenced below, the following Windows PowerShell Common Parameters are supported: Verbose, Debug, ErrorAction, ErrorVariable, WarningAction, WarningVariable, OutBuffer and OutVariable. For more information, type:
Add-SoftwareTokenToUser
This command assigns a single Defender software token to a user within Active Directory.
Syntax
Add-SoftwareTokenToUser [-UserCommonName] <string> [-TokenType] <string>
[[-TokenPIN] <string>] [-UserSearchBase <string>] [<CommonParameters>]
Parameters
UserCommonName
Common name of the user to whom the token will be assigned. TokenType
The type of the token added. This may be one of the following values: • Windows • Palm • Blackberry • WindowsPhone • iToken • Mobile • Android • EmailOTP • Java
These types produce tokens for use on the following platforms: • Windows - Windows operating systems
• Palm - Palm devices
• Blackberry - BlackBerry devices
• WindowsPhone - Devices running Windows mobile or Windows Phone operating systems • iToken - iPhone, iPad or iPod Touch devices
• Mobile - SMS token, where a text message containing one-time passwords is sent to the user's mobile phone
• Android - Devices running the Android operating system
• EmailOTP - Email token, where an email containing one-time passwords is sent to the user's mobile phone • Java - Windows, Mac or Linux operating systems that support Java applications
TokenPin
Optional parameter to specify PIN to assign to the user's token. PINs cannot be used when programming a Windows token.
UserSearchBase
Optional parameter to specify base container from which to search for users.
EXAMPLE 1
Assign a software token to use with the Defender Desktop Token on Windows to a user with CN BSmith
Add-SoftwareTokenToUser BSmith Windows
EXAMPLE 2
Assign a token to use with the iToken on iPhone, iPad or iPod Touch to a user with CN 'Bob Smith' specifying a PIN for the token and using a specific User Search Base
Add-SoftwareTokenToUser "Bob Smith" iToken 9876 -UserSearchBase
"CN=Users,DC=MyDomain,DC=Local"
EXAMPLE 3
Get-Content C:\Defender\NewTokens.txt | ForEach-Object {$data = $_.S
plit(","); Add-SoftwareTokenToUser $data[0] $data[1] $data[2] }
Description
Given a file
C:\Defender\NewTokens.txt
containing a list of comma-seperated lines containing user CN, token type and PIN assign a token to each user in the file.Example file contents:
BSmith,Windows
RJones,BlackBerry,1471
TBlack,iToken
This file would assign a Windows token to BSmith, a BlackBerry token with PIN to RJones and an iToken to TBlack.
Add-TokenToUser
This command assigns a single Defender token to a user within Active Directory.
For batch assignment of many users or tokens, the Add-TokenToUserBatch command will provide better performance than repeated running of this cmdlet.
Syntax
Add-TokenToUser [-UserCommonName] <string> [-TokenCommonName] <string>
[-UserSearchBase <string>] [-TokenSearchBase <string>] [<CommonParameters>]
Parameters
UserCommonName
Common name of the user to whom the token will be assigned. TokenCommonName
Common name of the token to be assigned. UserSearchBase
Optional parameter to specify base container from which to search for users. TokenSearchBase
Optional parameter to specify base container from which to search for tokens. Remarks
To see the examples, type:
"get-help Add-TokenToUser -examples"
For more information, type:
"get-help Add-TokenToUser -detailed" For technical information, type:
"get-help Add-TokenToUser -full" Example 1
Assign a token with Common Name (CN) GO0030050050253 to a user with CN BSmith:
Add-TokenToUser BSmith GO0030050050253
Example 2
Assign a token with CN GO0030050050253 to a user with CN 'Bob Smith' specifying a specific User Search Base:
Add-TokenToUser "Bob Smith" GO0030050050253 -UserSearchBase
"CN=Users,DC=MyDomain,DC=Local"
Example 3
Assign a token with CN GO0030050050253 to a user with CN "Bob Smith" specifying a specific User Search Base and Token Search Base:
Add-TokenToUser "Bob Smith" GO0030050050253 -UserSearchBase
"CN=Users,DC=mydomain,DC=Local" -TokenSearchBase
Parameters UsersFile
Name and path of the file containing common names of the users to whom tokens will be assigned. TokensFile
Name and path of the file containing common names of the tokens to be assigned. PINsFile
Name and path of the file containing the PINs to be assigned to the tokens. UserSearchBase
Optional parameter to specify base container from which to search for users. TokenSearchBase
Optional parameter to specify base container from which to search for tokens. Remarks
To see the examples, type:
"get-help Add-TokenToUserBatch -examples"
For more information, type:
"get-help Add-TokenToUserBatch -detailed"
For technical information, type:
Example 1
Assign tokens from a file named 'Tokens.txt' located in C:\Defender to users listed in the file 'Users.txt' located in C:\Defender:
Add-TokenToUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt
In this example the file format for the UsersFile is a list of users as shown below: Bob Smith
Bill Owen Gill Summers
and the file format for the TokensFile is a list of token CN's that exist in Active Directory, as shown below: GO0030050050277
GO0030050050253 GO0030050050260 In this example:
Bob Smith will have token GO0030050050277 assigned to his account Bill Owen will have token GO0030050050253 assigned to his account Gill Summers will have token GO0030050050260 assigned to her account.
Example 2
Assign tokens from a file named 'Tokens.txt' and set PINs from a file named 'PINs.txt' located in C:\Defender to users listed in the file 'Users.txt' located in C:\Defender:
Add-TokenToUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt
C:\Defender\PINs.txt
In this example the file format for the UsersFile is a list of users as shown below: Bob Smith
Bill Owen Gill Summers
and the file format for the TokensFile is a list of token CN's that exist in Active Directory, as shown below: GO0030050050277
GO0030050050253 GO0030050050260
and the file format for the PINsFile is a list of PINs as shown below: 1471
9090 6842 In this example:
In this example the file format for the UsersFile is a list of users as shown below: Bob Smith
Bill Owen Gill Summers
and the file format for the TokensFile is a list of token CN's that exist in Active Directory, as shown below: GO0030050050277
GO0030050050253 GO0030050050260
and the file format for the PINsFile is a list of PINs as shown below: 1471 expire
9090 expire 6842 expire In this example:
Bob Smith will have token GO0030050050277 with expired PIN 1471 assigned to his account Bill Owen will have token GO0030050050253 with expired PIN 9090 assigned to his account Gill Summers will have token GO0030050050260 with expired PIN 6842 assigned to her account.
Example 4
Assign tokens from a file named 'Tokens.txt' located in C:\Defender to users listed in the file 'Users.txt' located in C:\Defender
Add-TokenToUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt
In this example the file format for the UsersFile is a list of users as shown below: Bob Smith
and the file format for the TokensFile is a list of token CN's that exist in Active Directory, as shown below: GO0030050050277
PDAND3316900004 PDIPN3317169661 In this example:
Bob Smith will have token GO0030050050277, PDAND3316900004 and PDIPN3317169661 assigned to his account.
Example 5
Assign tokens from a file named 'Tokens.txt' located in C:\Defender to users listed in the file 'Users.txt' located in C:\Defender
Add-TokenToUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt
In this example the file format for the UsersFile is a list of users as shown below: Bob Smith
Bill Owen Gill Summers
and the file format for the TokensFile is a single token CN that exists in Active Directory, as shown below: GO0030050050277
In this example:
Bob Smith, Bill Owen and Gill Summers will have token GO0030050050277 assigned to their accounts.
Example 6
Assign tokens from a file named 'Tokens.txt' and set PINs from a file named 'PINs.txt' located in C:\Defender to users listed in the file 'Users.txt' located in C:\Defender.
Add-TokenToUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt
C:\Defender\PINs.txt
In this example the file format for the UsersFile is a list of users as shown below: Bob Smith
Bill Owen Gill Summers
and the file format for the TokensFile is a list of token CN's that exist in Active Directory, as shown below: GO0030050050277
GO0030050050253 GO0030050050260
and the file format for the PINsFile is a list of PINs as shown below: 1471
9090 In this example:
Bob Smith will have token GO0030050050277 with PIN 1471 assigned to his account Bill Owen will have token GO0030050050253 with PIN 9090 assigned to his account Gill Summer will have token GO0030050050260 assigned to her account with no PIN.
Example 7
Assign tokens from a file named 'Tokens.txt' and set PINs from a file named 'PINs.txt' located in C:\Defender to users listed in the file 'Users.txt' located in C:\Defender:
Add-TokenToUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt
C:\Defender\PINs.txt
In this example the file format for the UsersFile is a list of users as shown below: Bob Smith
Bill Owen Gill Summers
and the file format for the TokensFile is a list of token CN's that exist in Active Directory, as shown below: GO0030050050277
GO0030050050253 GO0030050050260
and the file format for the PINsFile is a list of PINs as shown below: 1471
In this example:
Bob Smith will have token GO0030050050277 with PIN 1471 assigned to his account Bill Owen will have token GO0030050050253 with PIN 1471 assigned to his account Gill Summer will have token GO0030050050260 with PIN 1471 assigned to her account.
Example 8
Assign tokens from a file named 'Tokens.txt' located in C:\Defender to users listed in the file 'Users.txt' located in C:\Defender using a specified User and Token Search Base:
Add-TokenToUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt -UserSearchBase
"CN=Users,DC=mydomain,DC=Local" -TokenSearchBase
Find-DefenderToken
This command will find Defender tokens matching a serial number or part of a serial number. Non-alphanumeric characters will be removed before searching.
Syntax
Find-DefenderToken [-TokenSerialNumber] <string> [-TokenSearchBase <string>]
<CommonParameters>]
Parameters
TokenSerialNumber
The serial number or part of the serial number to search for. Non alphanumeric characters will be removed before searching.
TokenSearchBase
Optional parameter to specify base container from which to search for tokens. Remarks
To see the examples, type:
"get-help Find-DefenderToken -examples"
For more information, type:
"get-help Find-DefenderToken -detailed"
For technical information, type:
"get-help Find-DefenderToken -full"
Example 1
To list the common name of all Defender Blackberry Tokens that have been programmed and exist in AD:
Find-DefenderToken BLB
Example 2
To list all Defender Tokens that have '277' as part of the serial number:
Find-DefenderToken 277
Example 3
To produce a list of tokens that have been programmed for the Android device using a specified Token Search Base:
Find-DefenderToken PDAND -TokenSearchBase
"OU=Tokens,OU=Defender,DC=MyDomain,DC=Local"
Get-DefenderLicense
This command retrieves details of the current Defender user and token licenses. There are no additional parameters for this command.
Syntax
Get-DefenderLicense [<CommonParameters>]
Remarks
To see the examples, type:
"get-help Get-DefenderLicense -examples"
For more information, type:
"get-help Get-DefenderLicense -detailed"
For technical information, type:
"get-help Get-DefenderLicense -full"
Example 1
To retrieve the current Defender User License:
Get-DefenderTemporaryResponses
Gets Defender tokens that have valid temporary responses assigned. Syntax
Get-DefenderTemporaryResponses [-UserSearchBase <string>] [<CommonParameters>]
Parameters
UserSearchBase <string>
Optional parameter to specify base container from which to search for users.
EXAMPLE 1
Retrieve Defender tokens that have valid temporary responses assigned. Get-DefenderTemporaryResponses
EXAMPLE 2
Retrieve Defender tokens that have valid temporary responses assigned for users with the specified User Search Base.
Get-DefenderUsersLastLogon
The cmdlet will list the name and last logon time for all users that have authenticated successfully to Defender. Syntax
Get-DefenderUsersLastLogon [-UserSearchBase <string>] [<CommonParameters>]
Parameters
UserSearchBase <string>
Optional parameter to specify base container from which to search for users.
Remarks
To see the examples, type:
"get-help Get-DefenderUsersLastLogon -examples"
For more information, type:
"get-help Get-DefenderUsersLastLogon -detailed"
For technical information, type:
"get-help Get-DefenderUsersLastLogon -full"
Example 1
To list the names and last logon times of all users who have authenticated to Defender:
Get-DefenderUsersLastLogon
Example 2
To list the names and last logon times of all users who have authenticated to Defender using a specified User Search Base:
Get-DefenderUsersLastLogon -UserSearchBase "CN=Users,DC=MyDomain,DC=Local"
Example 3
To list the names and last logon times of all users who have authenticated to Defender in the last 30 days:
Get-DefenderUsersLastLogon | Where-Object {$_.LastLogon -gt
((get-date).AddDays(-30))}
Example 4
To list the names and last logon times of all users who have authenticated to Defender since 1st November 2010:
Get-DefenderUsersLastLogon | Where-Object {$_.LastLogon -gt (get-date -Date 01/11/
2010)}
Get-TokensForUser
This command will list the Defender tokens currently assigned to a user account returning the token type, common name, DN and whether the token has a PIN assigned:
Syntax
Get-TokensForUser [-UserCommonName] <string> [-UserSearchBase <string>]
[<CommonParameters>]
Parameters
UserCommonName
Common name of the user whose tokens will be listed. UserSearchBase
Optional parameter to specify base container from which to search for users.
Remarks
To see the examples, type:
"get-help Get-TokensForUser -examples"
For more information, type:
"get-help Get-TokensForUser -detailed"
For technical information, type:
Example 1
To retrieve a list of the common names of all Defender Tokens assigned to a User account with a CN of 'Bob Smith':
Get-TokensForUser "Bob Smith"
The screen shot below shows an example of the results returned and how they are displayed when using the '|Format-List' or '|Format-Table' parameters:
Example 2
To retrieve a list of the common names of all Defender Tokens assigned to a User account with a CN of 'Bob Smith' using a specified User Search Base:
Get-UnactivatedSoftwareTokens
This command will list software tokens that have not been activated. Syntax
Get-UnactivatedSoftwareTokens ShowExpiredOnly [<SwitchParameter>]]
[-TokenSearchBase <string>] [<CommonParameters>]
Parameters ShowExpiredOnly
Optional, if specified only Defender Software tokens that have expired activation codes are displayed. TokenSearchBase
Optional parameter to specify base container from which to search for tokens.
Remarks
To see the examples, type:
"get-help Get-UnactivatedSoftwareTokens -examples"
For more information, type:
"get-help Get-UnactivatedSoftwareTokens -detailed"
For technical information, type:
"get-help Get-UnactivatedSoftwareTokens -full"
Example 1
To retrieve a list of Defender Software Tokens that have not been activated:
Get-UnactivatedSoftwareTokens
Example 2
To retrieve a list of Defender Software Tokens that have not been activated using a specified Token Search Base:
Get-UnactivatedSoftwareTokens -TokenSearchBase
"OU=Tokens,OU=Defender,DC=MyDomain,DC=Local"
Example 3
To retrieve a list of Defender Software Tokens where the activation code has expired:
Get-UnactivatedSoftwareTokens -ShowExpiredOnly
Example 4
To retrieve a list of Defender Software Tokens where the activation code has expired using a specified Token Search Base:
Get-UnactivatedSoftwareTokens -ShowExpiredOnly -TokenSearchBase
"OU=Tokens,OU=Defender,DC=MyDomain,DC=Local"
Get-UsersForToken
This command lists the users assigned to a Defender token. Syntax
Get-UsersForToken [-TokenCommonName] <string> [-TokenSearchBase <string>]
<CommonParameters>]
Parameters
TokenCommonName
Common name of the token whose users will be listed. TokenSearchBase
Optional parameter to specify base container from which to search for tokens.
Remarks
To see the examples, type:
"get-help Get-UsersForToken -examples"
For more information, type:
"get-help Get-UsersForToken -detailed"
For technical information, type:
"get-help Get-UsersForToken -full"
Example 1
To retrieve a list of user common names that have been assigned a token with CN GO0030050050277:
Get-UsersForToken GO0030050050277
Example 2
To retrieve a list of user common names that have been assigned a token with CN GO0030050050277 using a specified Token Search Base:
Get-UsersForToken GO0030050050277 -TokenSearchBase
"OU=Tokens,OU=Defender,DC=MyDomain,DC=Local"
Remove-AllTokensFromUser
This cmdlet can be used to remove or un-assign all Defender tokens from a user account.
For batch unassignment of many users or tokens, the Remove-TokenFromUserBatch command will provide better performance than repeated running of this cmdlet.
Syntax
Remove-AllTokensFromUser [-UserCommonName] <string> [-DeleteSoftwareToken
[<SwitchParameter>]] [-UserSearchBase <string>] [<CommonParameters>]
Parameters
UserCommonName
Common name of the user whose tokens will be unassigned. DeleteSoftwareToken
Optional, if specified then Defender Software tokens are removed from Active Directory as well as being unassigned from the user.
UserSearchBase
Optional parameter to specify base container from which to search for users.
Remarks
To see the examples, type:
"get-help Remove-AllTokensFromUser -examples"
For more information, type:
"get-help Remove-AllTokensFromUser -detailed"
For technical information, type:
"get-help Remove-AllTokensFromUser -full"
Example 1
To unassign all Defender tokens from a user with common name 'Bob Smith':
Remove-AllTokensFromUser "Bob Smith"
Example 2
To unassign all Defender tokens from a user with common name 'Bob Smith' using a specified User Search Base:
Remove-AllTokensFromUser "Bob Smith" -UserSearchBase "CN=Users,DC=mydomain,DC=Local"
Example 3
To unassign all Defender tokens from a user with common name 'Bob Smith' and remove any assigned Defender Software tokens from Active Directory:
Remove-DefenderPassword
This cmdlet deletes the Defender password for a user or all users in a group. Specify a user account name to delete the Defender password for a specific user. Specify a group name to delete the Defender passwords for all users in that group. Syntax
Remove-DefenderPassword [-UserGroupCommonName] <string> [-UserSearchBase <string>]
[<CommonParameters>]
Parameters
UserGroupCommonName
Common name of the user or group of users from which the Defender Password will be removed. UserSearchBase
Optional parameter to specify base container from which to search for users and groups.
Remarks
To see the examples, type:
"get-help Remove-DefenderPassword -examples"
For more information, type:
"get-help Remove-DefenderPassword -detailed"
For technical information, type:
"get-help Remove-DefenderPassword -full"
Example 1
To remove the Defender Password from a user with common name 'Bob Smith':
Remove-DefenderPassword "Bob Smith"
Example 2
To remove the Defender Password from all members of an Active Directory security group with common name 'Sales':
Remove-DefenderPassword Sales
Example 3
To remove the Defender Password from a user with common name 'Bob Smith' using a specified User Search Base:
Remove-PINFromUserToken
This cmdlet will remove a PIN that has been assigned to a user's token. Syntax
Remove-PINFromUserToken UserCommonName] <string> TokenCommonName] <string>
[-UserSearchBase <string>] [-TokenSearchBase <string>] [<CommonParameters>]
Parameters
UserCommonName
Common name of the user from whom the PIN will be removed. TokenCommonName
Common name of the token from which the PIN will be removed. UserSearchBase
Optional parameter to specify base container from which to search for users. TokenSearchBase
Optional parameter to specify base container from which to search for tokens.
Remarks
To see the examples, type:
"get-help Remove-PINFromUserToken -examples
For more information, type:
"get-help Remove-PINFromUserToken -detailed"
For technical information, type:
"get-help Remove-PINFromUserToken -full"
Example 1
To remove a PIN from a token with common name (CN) GO0030050050277, which has been assigned to a user with CN "Bob Smith":
Remove-PINFromUserToken "Bob Smith" GO0030050050277
Example 2
To remove a PIN from a token with common name (CN) GO0030050050277, which has been assigned to a user with CN "Bob Smith" using a specified User and Token Search Base:
Remove-PINFromUserToken "Bob Smith" GO0030050050277 -UserSearchBase
"CN=Users,DC=MyDomain,DC=Local" -TokenSearchBase
Remove-TemporaryResponse
This cmdlet will remove a temporary token response that has been assigned to a User's token. Syntax
Remove-TemporaryResponse [-UserCommonName] <string> [-TokenCommonName] <string>
[-UserSearchBase <string>] [-TokenSearchBase <string>] [<CommonParameters>]
Parameters
UserCommonName
Common name of the user to whom the temporary response has been assigned. TokenCommonName
Common name of the token to which the temporary response has been assigned. UserSearchBase
Optional parameter to specify base container from which to search for users. TokenSearchBase
Optional parameter to specify base container from which to search for tokens.
Remarks
To see the examples, type:
"get-help Remove-TemporaryResponse -examples"
For more information, type:
"get-help Remove-TemporaryResponse -detailed"
For technical information, type:
"get-help Remove-TemporaryResponse -full"
Example 1
To remove the temporary token response from a token with common name GO0030050050277 that is assigned to a user with common name 'Bob Smith':
Remove-TemporaryResponse "Bob Smith" GO0030050050277
Example 2
To remove the temporary token response from a token with common name GO0030050050277 that is assigned to a user with common name 'Bob Smith' specifying a specific User Search Base:
Remove-TemporaryResponse "Bob Smith" GO0030050050277 -UserSearchBase
"CN=Users,DC=MyDomain,DC=Local"
Example 3
To remove the temporary token response from a token with common name GO0030050050277 that is assigned to a user with common name 'Bob Smith' specifying a User and Token Search Base:
Remove-TemporaryResponse "Bob Smith" GO0030050050277 -UserSearchBase
"CN=Users,DC=MyDomain,DC=Local" -TokenSearchBase
Remove-TokenFromUser
This command will unassign a Defender token from a user in Active Directory.
For batch unassignment of many users or tokens, the Remove-TokenFromUserBatch command will provide better performance than repeated running of this cmdlet.
Syntax
Remove-TokenFromUser UserCommonName] <string> TokenCommonName] <string>
[-DeleteSoftwareToken [<SwitchParameter>]] [-UserSearchBase <string>] [-TokenSearchBase
<string>] [<CommonParameters>]
Parameters
UserCommonName
Common name of the user from whom the token will be unassigned. TokenCommonName
Common name of the token to be unassigned. DeleteSoftwareToken
Optional, if specified for a Defender Software token, the token will be removed from Active Directory as well as being unassigned from the user account.
UserSearchBase
Optional parameter to specify base container from which to search for users. TokenSearchBase
Optional parameter to specify base container from which to search for tokens.
Remarks
To see the examples, type:
"get-help Remove-TokenFromUser -examples"
For more information, type:
"get-help Remove-TokenFromUser -detailed"
For technical information, type:
"get-help Remove-TokenFromUser -full"
Example 1
Unassign a token with Common Name (CN) GO0030050050277 from a user with CN BSmith:
Remove-TokenFromUser BSmith GO0030050050277
Example 2
Unassign a token with CN GO0030050050277 from a user with CN 'Bob Smith' specifying a specific User Search Base:
Remove-TokenFromUser "Bob Smith" GO0030050050277 -UserSearchBase
"CN=Users,DC=MyDomain,DC=Local"
Remove-TokenFromUserBatch
This command will unassign the tokens in the token file from the users on the corresponding line in the users file. If the users file contains just one user, all tokens listed in the tokens file are unassigned from that user.
If the tokens file contains just one token, all users listed in the users file are unassigned that token. The word all may be specified on a line in the tokens file, in which case all tokens are unassigned from the corresponding user in the users file.
These files use the same format as described for Add-TokenToUserBatch. Syntax
Remove-TokenFromUserBatch [-UsersFile] <string> [-TokensFile] <string>
[-DeleteSoftwareToken [<SwitchParameter>]] [-UserSearchBase <string>]
[-TokenSearchBase <string>] [<CommonParameters>]
Parameters UsersFile
Name of file containing common names of the users from whom tokens will be unassigned. TokensFile
Name of file containing common names of the tokens to be unassigned. DeleteSoftwareToken
Optional, if specified then Defender Software tokens are removed from Active Directory as well as being removed from the user.
UserSearchBase
Optional parameter to specify base container from which to search for users. TokenSearchBase
Optional parameter to specify base container from which to search for tokens.
Remarks
To see the examples, type:
"get-help Remove-TokenFromUserBatch -examples"
For more information, type:
"get-help Remove-TokenFromUserBatch -detailed"
For technical information, type:
Example 1
Unassign tokens from a file named 'Tokens.txt' located in C:\Defender from users listed in the file 'Users.txt' located in C:\Defender:
Remove-TokenFromUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt
In this example the file format for the UsersFile is a list of users as shown below: Bob Smith
Bill Owen Gill Summers
and the file format for the TokensFile is a list of token CN's that exist in Active Directory, as shown below: GO0030050050277
GO0030050050253 GO0030050050260 In this example:
Bob Smith will have token GO0030050050277 unassigned from his account Bill Owen will have token GO0030050050253 unassigned from his account Gill Summer will have token GO0030050050260 unassigned from her account.
Example 2
Unssign tokens from a file named 'Tokens.txt' located in C:\Defender from users listed in the file 'Users.txt' located in C:\Defender, where only a single user common name is specified:
Remove-TokenFromUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt
In this example the file format for the UsersFile is a list of users as shown below: Bob Smith
and the file format for the TokensFile is a list of token CN's that exist in Active Directory, as shown below: GO0030050050277
PDAND3316900004 PDIPN3317169661 In this example:
Bob Smith will have token GO0030050050277, PDAND3316900004 and PDIPN3317169661 unassigned from his account.
Example 3
Unssign tokens from a file named 'Tokens.txt' located in C:\Defender from users listed in the file 'Users.txt' located in C:\Defender, where only a single token common name is specified:
Remove-TokenFromUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt
In this example the file format for the UsersFile is a list of users as shown below: Bob Smith
Bill Owen Gill Summers
and the file format for the TokensFile is a single token CN that exists in Active Directory, as shown below: GO0030050050277
In this example:
Bob Smith, Bill Owen and Gill Summers will have token GO0030050050277 unassigned from their accounts.
Example 4
Unssign tokens from a file named 'Tokens.txt' located in C:\Defender from users listed in the file 'Users.txt' located in C:\Defender, using the \all\ parameter in the Tokens.txt file:
Remove-TokenFromUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt
In this example the file format for the UsersFile is a list of users as shown below: Bob Smith
Bill Owen Gill Summers
and the file format for the TokensFile is as shown below: GO0030050050277
all all In this example:
Bob Smith will have token GO0030050050277 unassigned from his account Bill Owen will have all Defender tokens unassigned from his account
Gill Summer will have all Defender tokens unassigned from her account.
Example 5
Unassign tokens from a file named 'Tokens.txt' located in C:\Defender from users listed in the file 'Users.txt' located in C:\Defender using a specified User and Token Search Base:
RemoveTokenFromUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt
-UserSearchBase "CN=Users,DC=mydomain,DC=Local" -TokenSearchBase
Example 6
Unassign tokens from a file named 'Tokens.txt' located in C:\Defender from users listed in the file 'Users.txt' located in C:\Defender, where only a single user common name is specified:
RemoveTokenFromUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt
-DeleteSoftwareToken
In this example the file format for the UsersFile is a list of users as shown below: Bob Smith
and the file format for the TokensFile is a list of token CN's that exist in Active Directory, as shown below: GO0030050050277
PDAND3316900004 PDIPN3317169661 In this example:
Bob Smith will have token GO0030050050277, PDAND3316900004 and PDIPN3317169661 unassigned from his account. Tokens PDAND3316900004 and PDIPN3317169661 will also be removed from Active Directory.
Reset-DefenderToken
This cmdlet will reset a Defender token to aid authentication should the token become out of synchronization with the Defender Security Server.
Syntax
Reset-DefenderToken [-TokenCommonName] <string> [-TokenSearchBase <string>]
[<CommonParameters>]
Parameters
TokenCommonName
Common name of the token to reset. TokenSearchBase
Optional parameter to specify base container from which to search for tokens.
Remarks
To see the examples, type:
"get-help Reset-DefenderToken -examples"
For more information, type:
"get-help Reset-DefenderToken -detailed"
For technical information, type:
"get-help Reset-DefenderToken -full"
Example 1
To reset the token with common name GO0061454569921:
Reset-DefenderToken GO0061454569921
Example 2
To reset the token with common name GO0061454569921 using a specified Token Search Base:
Reset-DefenderToken GO0061454569921 -TokenSearchBase
"OU=Tokens,OU=Defender,DC=MyDomain,DC=Local"
Reset-DefenderViolationCount
This cmdlet will reset a user's Defender violation count.
Also allows the violation and reset counts to be viewed without resetting them. Syntax
Reset-DefenderViolationCount [-UserCommonName] <string>
[-ViewOnly [<SwitchParameter>]] [-UserSearchBase <string>] [<CommonParameters>]
Parameters
UserCommonName
Common name of the user whose violation count is to be reset. ViewOnly
Optional parameter, if specified then the violation count and reset count are returned but not adjusted. UserSearchBase
Optional parameter to specify base container from which to search for users.
Remarks
To see the examples, type:
"get-help Reset-DefenderViolationCount -examples"
For more information, type:
"get-help Reset-DefenderViolationCount -detailed"
For technical information, type:
"get-help Reset-DefenderViolationCount -full"
Example 1
To reset the Defender Violation Count for a user with CN BSmith:
Reset-DefenderViolationCount BSmith
Example 2
To reset the Defender violation count for a user with CN "Bob Smith" specifying a specific User Search Base:
Reset-DefenderViolationCount "Bob Smith" -UserSearchBase
"CN=Users,DC=MyDomain,DC=Local"
Example 3
To view the violation count and reset count information for a user with CN "Bob Smith":
Set-DefenderPassword
This cmdlet sets the Defender password for a user or all users in a group. Specify the user account name to set the Defender password for that user. Specify the group name to assign the Defender password to all users in the group. Syntax
Set-DefenderPassword [-UserGroupCommonName] <string> [-Password] <string>
[-Expire [<SwitchParameter>]] [-Overwrite [<SwitchParameter>]]
[-UserSearchBase <string>] [<CommonParameters>]
Parameters
UserGroupCommonName
Common name of the user or group of users to which the Defender Password will be added. Password
The Defender Password to set. -Expire
Sets the Defender Password to be expired. -Overwrite
Overwrites an existing Defender Password, by default existing Defender Password are not overwritten. UserSearchBase
Optional parameter to specify base container from which to search for users and groups.
Remarks
To see the examples, type:
"get-help Set-DefenderPassword -examples"
For more information, type:
"get-help Set-DefenderPassword -detailed"
For technical information, type:
"get-help Set-DefenderPassword -full"
Example 1
Assign a Defender Password 'MyPassword' to a user account with Common Name (CN) "Bob Smith":
Set-DefenderPassword "Bob Smith" MyPassword
Example 2
Assign a Defender Password 'MyPassword' to a user account with Common Name (CN) "Bob Smith" and configure the password to expire so that the user is prompted to change the Defender Password on first use:
Set-DefenderPassword "Bob Smith" MyPassword -expire
Example 3
Assign a Defender Password 'MyNewPassword' to a user account with Common Name (CN) "Bob Smith" and configure the password to expire so that the user is prompted to change the Defender Password on first use and
Set-PINOnUserToken
This cmdlet sets a PIN on a token that has been assigned to a user. Syntax
Set-PINOnUserToken [-UserCommonName] <string> [-TokenCommonName] <string> [-TokenPIN]
<string> [-UserSearchBase <string>] [-TokenSearchBase <string>] [<CommonParameters>]
Parameters
UserCommonName
Common name of the user to whom the PIN will be assigned. TokenCommonName
Common name of the token to which the PIN will be assigned. TokenPIN
The PIN to assign. UserSearchBase
Optional parameter to specify base container from which to search for users. TokenSearchBase
Optional parameter to specify base container from which to search for tokens.
Remarks
To see the examples, type:
"get-help Set-PINOnUserToken -examples"
For more information, type:
"get-help Set-PINOnUserToken -detailed"
For technical information, type:
"get-help Set-PINOnUserToken -full"
Example 1
To set a PIN of '1234' on a token with common name (CN) GO0030050050277, which has been assigned to a user with CN "Bob Smith":
Set-PINOnUserToken "Bob Smith" GO0030050050277 1234
Example 2
To set a PIN of '1234' on a token with common name (CN) GO0030050050277, which has been assigned to a user with CN "Bob Smith" using a specified User and Token Search Base:
Set-PINOnUserToken "Bob Smith" GO0030050050277 1234 -UserSearchBase
"CN=Users,DC=mydomain,DC=Local" -TokenSearchBase
Set-TemporaryResponse
To set a temporary token response on a token that has been assigned to a user account and specify the expiry date and whether the temporary token response can be used once only or multiple times.
If the token assigned to the user has a PIN assigned then the PIN must be used with the temporary token response.
Syntax
Set-TemporaryResponse [-UserCommonName] <string> [-TokenCommonName] <string>
[-ExpiryTimeMinutes] <string> [-MultipleUse] [-UserSearchBase <string>]
[-TokenSearchBase <string>] [<CommonParameters>]
Parameters
UserCommonName
Common name of the user to whom the temporary response will be assigned. TokenCommonName
Common name of the token to which the temporary response wil be assigned. ExpiryTimeMinutes
The time, in minutes, for which the temporary response is valid. MultipleUse
Optional parameter, if specified then temporary response can be used multiple times. UserSearchBase
Optional parameter to specify base container from which to search for users. TokenSearchBase
Optional parameter to specify base container from which to search for tokens.
Remarks
To see the examples, type:
"get-help Set-TemporaryResponse -examples"
For more information, type:
"get-help Set-TemporaryResponse -detailed" For technical information, type:
Example 1
To set a temporary token response on a token with common name (CN) GO0061454569921, which has been assigned to a user with CN "Bob Smith" that will expire in 1 day and can only be used once:
Set-TemporaryResponse "Bob Smith" GO0061454569921 1440
When the above cmdlet is used the temporary token response and expiry date / time will be listed as in the example below:
User "Bob Smith" can then use a temporary token response of '600202' once within the next 1440 minutes (1 day).
Example 2
To set a temporary token response on a token with common name (CN) GO0061454569921, which has been assigned to a user with CN "Bob Smith" that will expire in 7 days and can be used multiple times:
Set-TemporaryResponse "Bob Smith" GO0061454569921 10080 -MultipleUse
When the above cmdlet is used the temporary token response and expiry date / time will be listed as in the example below:
User "Bob Smith" can then use a temporary token response of '800750' multiple times within the next 10080 minutes (7 days).
Example 3
To set a temporary token response on a token with common name (CN) GO0061454569921, which has been assigned to a user with CN "Bob Smith" that will expire in 7 days and can be used multiple times specifying a User and Token Search Base:
Set-TemporaryResponse "Bob Smith" GO0061454569921 10080 -MultipleUse -UserSearchBase
"CN=Users,DC=mydomain,DC=Local" -TokenSearchBase
Test-DefenderToken
This cmdlet tests a Defender token's response. Syntax
Test-DefenderToken [-TokenCommonName] <string> [-Response] <string>
[[-Challenge] <string>] [-TokenSearchBase <string>] [<CommonParameters>]
Parameters
TokenCommonName
Common name of the token to test. Response
The token response. Challenge
The token challenge, not required for synchronous tokens. TokenSearchBase
Optional parameter to specify base container from which to search for tokens.
Remarks
To see the examples, type:
"get-help Test-DefenderToken -examples"
For more information, type:
"get-help Test-DefenderToken -detailed"
For technical information, type:
"get-help Test-DefenderToken -full"
Example 1
To test the current token response, 980536, for a synchronous token with common name GO0061454569921:
Test-DefenderToken GO0061454569921 980536
If the response is not valid a message 'Token test failed' will be displayed.
Example 2
To test the current token response for a challenge / response token with common name PDWIN3053600081, where 457939 is the challenge and 363954 the response:
Test-DefenderToken PDWIN3053600081 363954 457939
Example 3
To test the current token response, 574102, for a synchronous token with common name GO0061454569921 using a specified Token Search Base: