OnedriveMapper V3 public release

Dear OnedriveMapper users,

I’m finally convinced after the help of a large number of beta testers and other supporters that I can release OnedriveMapper V3 to the general public. I don’t expect it to work in all situations, things like MFA and Okta are not yet supported, but I believe it will benefit the majority.

OnedriveMapper V3 features a new authentication mode (‘native mode’), in which authentication takes mere seconds, improving mapping speed on average by a factor 10 or higher. In addition, OnedriveMapper can automatically switch between both authentication modes if one fails, making it far more robust.

Please check the full changelog to verify compatibility of the changes with your environment, and test carefully before deploying in production.

And thanks to those who provided me with Teamviewer access to their unique environments and/or feedback to help make OnedriveMapper the best free product to map your Onedrive for Business or Sharepoint Online libraries to a driveletter.

Get it here

ADFS SmartLink for OnedriveMapper

ADFS SmartLinks are very useful tools to get your user signed into a service super quickly. As of version 3.02, OnedriveMapper supports these links for both IE and Native authentication mode.

I wrote an article on how to create an ADFS smartlink for the Intune portal once, that should get you started, but point your smartlink to “https://{YOUR TENANT NAME}”.

Then configure $adfsSmartLink in OnedriveMapper with your ADFS SmartLink. OnedriveMapper should then immediately get logged into Onedrive For Business, reducing logon delays by seconds or more depending on the auth method you’re using.

Onedrivemapper V3 beta

As of today, V3 of OnedriveMapper is in testing. It features an auto-updater and does native (no internet explorer) authentication.

The auto updater only works for OnedriveMapper Cloud beta testers, after beta OnedriveMapper Cloud will probably be a service where you can manage / control all OnedriveMapper settings as configurations for your organisation(s) centrally. OnedriveMapper Cloud comes as both a ps1 and msi version.

If you’d like to try OnedriveMapper Cloud, contact me.

Setting a Windows Cookie with Powershell (using InternetSetcookie in WinInet)

As I’m trying to improve OnedriveMapper, I’ve been looking into methods to avoid using Browser Emulation to authenticate with Office 365.

This wasn’t difficult, but storing the cookie posed a challenge. There are no available methods in Powershell to do so, thus I went searching until I ran into a post on Stackoverflow that shows how to store a cookie using C#

Since Powershell can eat C#, this ended up being my working code to set a persistent OS cookie from Powershell:

using System.Runtime.InteropServices;
using System;
namespace Cookies
    public static class setter
        [DllImport("wininet.dll", CharSet = CharSet.Auto, SetLastError = true)]
        private static extern bool InternetSetCookie(string url, string name, string data);

        public static bool SetWinINETCookieString(string url, string name, string data)
            bool res = setter.InternetSetCookie(url, name, data);
            if (!res)
                throw new Exception("Exception setting cookie: Win32 Error code="+Marshal.GetLastWin32Error());
                return res;

$compilerParameters = New-Object System.CodeDom.Compiler.CompilerParameters

Add-Type -TypeDefinition $source -Language CSharp -CompilerParameters $compilerParameters

[DateTime]$dateTime = Get-Date
$str = $dateTime.ToString("R")


edit: don’t use the Get-Hotfix PS command before you run above code, for some reason it breaks things.

O365Undo updated for O365 Groups

O365Undo is a great script you can use to roll back actions of your user(s) in Office 365. Most likely, actions your user wasn’t aware of but were actually done by a CryptoLocker or by RansomWare.

These nasty virusses can cause havoc on your mapped or synced Sharepoint Online or Onedrive for Business libraries in the form of file level encryption or file name obfuscation.

This new version also protects Office 365 Groups.

Read more or download the script

Using Powershell to check a user’s tenant logon setting in Office 365 (without logging in)

I was interested in being able to see, for any given email, what type of authentication Microsoft requires for that user. This could be Office 365 (Azure AD) native, ADFS, etc.

Powershell can easily help you out:

Add-Type -AssemblyName System.Web
$uidEnc = [System.Web.HttpUtility]::HtmlEncode($uid)
$res = Invoke-WebRequest -Uri -SessionVariable cookies -Method Get -UseBasicParsing
$stsRequest = ($res.InputFields | where {$_.Name -eq "ctx"}).Value
$flowToken = ($res.InputFields | where {$_.Name -eq "flowToken"}).Value
$canary = ($res.InputFields | where {$_.Name -eq "canary"}).Value
$res = Invoke-WebRequest -Uri "$uidEnc&api-version=2.1&stsRequest=$stsRequest&checkForMicrosoftAccount=false" -WebSession $cookies -Method GET -UseBasicParsing

The response will contain a redirect to another authentication provider (ADFS) or Azure AD Native. This is an example JSON response:

{"NameSpaceType":"Managed","Login":"","DomainName":"","FederationBrandName":"Lieben Consultancy","TenantBrandingInfo":null,"cloud_instance_name":""}

If you also wish to include Microsoft accounts, set the checkForMicrosoftAccount parameter in the second request to true

AzureAD Connect SSO
If you’re using AzureAD Connect SSO, you can use the above to check if this is correctly set in Office 365. The JSON response will contain a propert is_dsso_enabled, which will be set to True

Prevent duplicate or hanging Powershell processes that run from the Task Scheduler

Many automated processes we write in Powershell are scheduled on a server somewhere and run periodically.
Sometimes, the script may hang. In my experience, the task scheduler setting “Stop the task if it runs longer than:” rarely works properly when a Powershell script hangs. It either thinks it stopped the task, or is unable to.

This can result in memory hogging runaway Powershell processes, locked log files, concurrent user issues, etc etc.

If you want to prevent that from happening, add this function to your script and call it once at the start of your script. It will kill any Powershell process with the same script name that does not match the running process’s Process ID. It requires Powershell 3+:

function preventDoubleSchedule{
        $scriptFileName = split-path $MyInvocation.PSCommandPath -Leaf
    }catch{$scriptFileName = $Null}
        [Array]$psProcesses = @(Get-WmiObject Win32_Process -Filter "name like '%Powershell.exe%' and handle != '$pid'" | where {$_})
    if($psProcesses.Count -gt 0){
        foreach($psProcess in $psProcesses){
            if($psProcess.CommandLine -like "*$scriptFileName*" -and $scriptFileName){
                ##we've found a Powershell process that is running this script, but does not have the same process ID, lets try to kill it
                    Stop-Process -Id $psProcess.Handle -Force -Confirm:$False

O365GroupSync v0.50 available!

Version 0.50 is out, changes:

  • fixed a bug in using the wrong smtp prefix when searching
  • removed log spam about skipped inactive accounts
  • set managedBy after creating all groups
  • extra mail parameters to allow configuration of WHEN emails are sent (e.g. only in case of errors)
  • send error mail when log file is locked
  • reconnect to ExO each caching action
  • overwrite instead of add primary smtp
  • set mailNickName and legacyExchangeDN values when creating AD group so the group isn’t invisible in the legacy exchange console

Get it here

OnedriveMapper v2.53 released!

Version 2.53 of OneDriveMapper has been released!

  • Updated to work with changes in MS’s backend
  • Better handling of AzureAD SSO Preview

This morning I received reports that the O4B mapping was failing, but SpO ones weren’t. Digging into this I noticed that if I attempted to map the moment the script hits O4B, it did work, so OnedriveMapper now handles the timing a bit different to work with the changes Microsoft made on their end.

Get the new version here