Get-VPASAllActiveSessions


Supported Environments:
SelfHosted
SharedServices
PCloudStandard


Synopsis:

GET ALL ACTIVE SESSIONS


Description:

USE THIS FUNCTION TO GET ALL ACTIVE PSM SESSIONS


Syntax:

Get-VPASAllActiveSessions [[-token] <Hashtable>] [<CommonParameters>]


Parameters:

-token <Hashtable>
HashTable of data containing various pieces of login information (PVWA, LoginToken, HeaderType, etc).
If -token is not passed, function will use last known hashtable generated by New-VPASToken

Required: false
Position: 1
Default value:
Accept pipeline input: true (ByPropertyName)
Accept wildcard characters: false

<CommonParameters>
This cmdlet supports the common parameters: Verbose, Debug
ErrorAction, ErrorVariable, WarningAction, WarningVariable
OutBuffer, PipelineVariable, and OutVariable. For more information, see
about_CommonParameters (https:/go.microsoft.com/fwlink/?LinkID=113216)


Examples:

$AllActiveSessionsJSON = Get-VPASAllActiveSessions


Outputs:

If successful:
{
         "LiveSessions": [
                 {
                         "CanTerminate": false,
                         "CanMonitor": true,
                         "CanSuspend": false,
                         "SessionID": "31_24",
                         "SessionGuid": "737160df-bba6-494f-875d-8bcf0f5ef9db",
                         "SafeName": "PSMRecordings",
                         "FolderName": "Root",
                         "IsLive": true,
                         "FileName": "737160df-bba6-494f-875d-8bcf0f5ef9db.session",
                         "Start": 1724215310,
                         "End": 0,
                         "Duration": 115,
                         "User": "administrator",
                         "RemoteMachine": "192.168.20.126",
                         "ProtectionDate": 0,
                         "ProtectedBy": "",
                         "ProtectionEnabled": false,
                         "AccountUsername": "PSMTestUser",
                         "AccountPlatformID": "WinServerLocal",
                         "AccountAddress": "192.168.20.126",
                         "PIMSuCommand": "",
                         "PIMSuCWD": "",
                         "ConnectionComponentID": "PSM-RDP",
                         "PSMRecordingEntity": "SessionRecording",
                         "TicketID": "",
                         "FromIP": "192.168.20.1",
                         "Protocol": "RDP",
                         "Client": "RDP",
                         "RiskScore": -1,
                         "Severity": "",
                         "IncidentDetails": null,
                 "RawProperties": "@{Address=192.168.20.126; ConnectionComponentID=PSM-RDP; DeviceType=Operating System; EntityVersion=1.0; ExpectedRecordingsList=737160df-bba6-494f-875d-8bcf0f5ef9db.WIN.txt,737160df-bba6-494f-875d-8bcf0f5ef9db.VID.avi; PSMClientApp=mstsc.exe; PSMPasswordID=5; PSMProtocol=RDP; PSMRecordingEntity=SessionRecording; PSMRemoteMachine=192.168.20.126; PSMSafeID=28; PSMSourceAddress=192.168.20.1; PSMStartTime=1724215310; PSMStatus=Placeholder; PSMVaultUserName=administrator; PolicyID=WinServerLocal; ProviderID=PSMApp_COMPONENTS; UserName=PSMTestUser; Safe=PSMRecordings; Folder=Root; Name=737160df-bba6-494f-875d-8bcf0f5ef9db.session}",
                         "RecordingFiles": "",
                         "RecordedActivities": "",
                         "VideoSize": null,
                         "TextSize": null,
                         "DetailsUrl": "Livesessiondetails.aspx?Data=UFNNUmVjb3JkaW5nc15AXlJvb3ReQF43MzcxNjBkZi1iYmE2LTQ5NGYtODc1ZC04YmNmMGY1ZWY5ZGIuc2Vzc2lvbl5AXjBeQF5GYWxzZV5AXkZhbHNlXkBeXkBeQmFja1VSTD1Nc2dFcnI9TXNnSW5mbz0%3d"
                 }
         ],
         "Total": 1
}

$false if failed